How to effectively share household devices

August 2024 Smart Home Automation, Information Security


Anna Collard

It is a familiar scene in South Africa: multiple household members sharing a single device. Due to social and economic challenges, many parents cannot afford to provide each child with a cell phone, tablet, or computer, leading to the eight hours per day online, making device sharing among family members commonplace. However, what are the potential drawbacks and dangers associated with this extensive device use and sharing among parents and siblings?

To navigate this issue successfully, Anna Collard, SVP Content Strategy and Evangelist at KnowBe4 Africa, urges the importance of establishing clear boundaries to prevent conflicts.

“Create a family agreement where you set up some clear guidelines for technology use,” she says. “You should establish rules for when and how long each family member can use the device and what for.” A great site with helpful resources and a family agreement template can be found at Childnet.

Collard recommends having set times for device usage. “Remember, children often need access to screens to do their homework, so this needs to be given a separate time allocation from leisure screen time, such as watching TV or gaming.” Certain times, like mealtimes and other family connection times, should be device-free.

Devices should also be put away at night. “By designating a central location for charging devices overnight, you ensure devices are charged for the next day, and it also encourages unplugging before bedtime.”

Ensure strong privacy settings

If devices are shared, it is paramount to create some virtual boundaries. “Ensure that each user has their own account and understands privacy settings,” advises Collard. “For example, personal email accounts, social media profiles and cloud storage should be separate.”

The importance of individual user profiles for each family member is to keep personal data, documents, and settings separate and secure. “Each profile should require a password that only the owner knows; parents should know the passwords of their younger kids,” she comments. “Use parental control features to restrict access to inappropriate content and to manage screen time and app usage. This not only protects children but also helps to reinforce the family’s screen-time rules.”

Collard recommends regularly going through apps and privacy settings with your children. “This is a good opportunity to discuss what these apps and settings do and why privacy is crucial,” she says. “Monitor the device’s browsing history to ensure that children adhere to the agreed-upon rules and do not engage with harmful content.”

Keep cybersecurity top of mind

For online safety, update software on shared devices as often as possible. “Regularly update operating systems, apps, and security software to protect against vulnerabilities,” urges Collard. She also suggests speaking to your children about recognising scams and the risks of clicking on unknown links.

“Make rules regarding the downloading and purchasing of apps,” she advises. “Children should get permission before downloading any new app or making in-app purchases to prevent unintended expenses and the installation of potentially unsafe apps.”

Other suggestions to improve cybersecurity include making sure parents log out of their profiles before sharing a device with their kids. “When watching a streaming service, parents should ensure their children are accessing it using their profile to avoid exposure to inappropriate content.”

She also recommends securing your home Wi-Fi network with a strong password and to limit the use of the administrator’s account. Only parents should have access to the administrator account, never kids. This will prevent access to inappropriate content, sites, or them installing malware that might overwrite all your files and gain access to your accounts.”

Enable multi-factor authentication (MFA) for online accounts as an extra precaution. “This will add another layer of security even if someone else has access to saved passwords on shared devices,” she says.

Finally, it is important to have honest and open communication with everyone in the family. “Discuss and review the agreement on screen time regularly, as well as the importance of digital safety,” Collard concludes. “If something goes wrong, children need to tell their parents. In turn, parents should model the online behaviour they expect from their kids, from maintaining privacy and security practices to being respectful digital citizens.”




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...
Continuous security optimisation.
News & Events Information Security
Cymulate has announced its partnership with SentinelOne, a threat exposure validation and AI-powered cybersecurity platform. The collaboration delivers self-healing endpoint security that empowers businesses to increase protection for every endpoint on their network.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.