How to effectively share household devices

August 2024 Smart Home Automation, Information Security


Anna Collard

It is a familiar scene in South Africa: multiple household members sharing a single device. Due to social and economic challenges, many parents cannot afford to provide each child with a cell phone, tablet, or computer, leading to the eight hours per day online, making device sharing among family members commonplace. However, what are the potential drawbacks and dangers associated with this extensive device use and sharing among parents and siblings?

To navigate this issue successfully, Anna Collard, SVP Content Strategy and Evangelist at KnowBe4 Africa, urges the importance of establishing clear boundaries to prevent conflicts.

“Create a family agreement where you set up some clear guidelines for technology use,” she says. “You should establish rules for when and how long each family member can use the device and what for.” A great site with helpful resources and a family agreement template can be found at Childnet.

Collard recommends having set times for device usage. “Remember, children often need access to screens to do their homework, so this needs to be given a separate time allocation from leisure screen time, such as watching TV or gaming.” Certain times, like mealtimes and other family connection times, should be device-free.

Devices should also be put away at night. “By designating a central location for charging devices overnight, you ensure devices are charged for the next day, and it also encourages unplugging before bedtime.”

Ensure strong privacy settings

If devices are shared, it is paramount to create some virtual boundaries. “Ensure that each user has their own account and understands privacy settings,” advises Collard. “For example, personal email accounts, social media profiles and cloud storage should be separate.”

The importance of individual user profiles for each family member is to keep personal data, documents, and settings separate and secure. “Each profile should require a password that only the owner knows; parents should know the passwords of their younger kids,” she comments. “Use parental control features to restrict access to inappropriate content and to manage screen time and app usage. This not only protects children but also helps to reinforce the family’s screen-time rules.”

Collard recommends regularly going through apps and privacy settings with your children. “This is a good opportunity to discuss what these apps and settings do and why privacy is crucial,” she says. “Monitor the device’s browsing history to ensure that children adhere to the agreed-upon rules and do not engage with harmful content.”

Keep cybersecurity top of mind

For online safety, update software on shared devices as often as possible. “Regularly update operating systems, apps, and security software to protect against vulnerabilities,” urges Collard. She also suggests speaking to your children about recognising scams and the risks of clicking on unknown links.

“Make rules regarding the downloading and purchasing of apps,” she advises. “Children should get permission before downloading any new app or making in-app purchases to prevent unintended expenses and the installation of potentially unsafe apps.”

Other suggestions to improve cybersecurity include making sure parents log out of their profiles before sharing a device with their kids. “When watching a streaming service, parents should ensure their children are accessing it using their profile to avoid exposure to inappropriate content.”

She also recommends securing your home Wi-Fi network with a strong password and to limit the use of the administrator’s account. Only parents should have access to the administrator account, never kids. This will prevent access to inappropriate content, sites, or them installing malware that might overwrite all your files and gain access to your accounts.”

Enable multi-factor authentication (MFA) for online accounts as an extra precaution. “This will add another layer of security even if someone else has access to saved passwords on shared devices,” she says.

Finally, it is important to have honest and open communication with everyone in the family. “Discuss and review the agreement on screen time regularly, as well as the importance of digital safety,” Collard concludes. “If something goes wrong, children need to tell their parents. In turn, parents should model the online behaviour they expect from their kids, from maintaining privacy and security practices to being respectful digital citizens.”




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
Bringing fire safety closer to home
SafeQuip Fire & Safety Products & Solutions Smart Home Automation
SafeQuip’s latest product launch introduces two compact, disposable fire extinguishers for everyday use, one suitable for Class A, B, and C fires, the other rated for Class A, B and F fires.

Read more...
Exhibitions across the security spectrum
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
HomeSec Expo has become the security industry’s premier trade event. Visitors will experience a live showcase of how different aspects of the security spectrum come together under one roof.

Read more...
A clear vision for a safer, smarter future
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
With its authoritative lineup of sponsors and exhibitors, HomeSec Expo 2026 embodies an authoritative, yet pragmatic vision, for the security industry. It is a vision that recognises both the urgency of current threats and the excitement of technological innovation.

Read more...
The role of safe storage in mitigating burglary and fire risk
Gunnebo Safe Storage Africa Products & Solutions Fire & Safety Smart Home Automation
Household burglary and fire remain amongst the most common threats to household assets in South Africa. Statistics South Africa’s 2024 Victims of Crime Survey reported approximately 1,5 million incidents of housebreaking in a single year.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.