How to effectively share household devices

August 2024 Smart Home Automation, Information Security


Anna Collard

It is a familiar scene in South Africa: multiple household members sharing a single device. Due to social and economic challenges, many parents cannot afford to provide each child with a cell phone, tablet, or computer, leading to the eight hours per day online, making device sharing among family members commonplace. However, what are the potential drawbacks and dangers associated with this extensive device use and sharing among parents and siblings?

To navigate this issue successfully, Anna Collard, SVP Content Strategy and Evangelist at KnowBe4 Africa, urges the importance of establishing clear boundaries to prevent conflicts.

“Create a family agreement where you set up some clear guidelines for technology use,” she says. “You should establish rules for when and how long each family member can use the device and what for.” A great site with helpful resources and a family agreement template can be found at Childnet.

Collard recommends having set times for device usage. “Remember, children often need access to screens to do their homework, so this needs to be given a separate time allocation from leisure screen time, such as watching TV or gaming.” Certain times, like mealtimes and other family connection times, should be device-free.

Devices should also be put away at night. “By designating a central location for charging devices overnight, you ensure devices are charged for the next day, and it also encourages unplugging before bedtime.”

Ensure strong privacy settings

If devices are shared, it is paramount to create some virtual boundaries. “Ensure that each user has their own account and understands privacy settings,” advises Collard. “For example, personal email accounts, social media profiles and cloud storage should be separate.”

The importance of individual user profiles for each family member is to keep personal data, documents, and settings separate and secure. “Each profile should require a password that only the owner knows; parents should know the passwords of their younger kids,” she comments. “Use parental control features to restrict access to inappropriate content and to manage screen time and app usage. This not only protects children but also helps to reinforce the family’s screen-time rules.”

Collard recommends regularly going through apps and privacy settings with your children. “This is a good opportunity to discuss what these apps and settings do and why privacy is crucial,” she says. “Monitor the device’s browsing history to ensure that children adhere to the agreed-upon rules and do not engage with harmful content.”

Keep cybersecurity top of mind

For online safety, update software on shared devices as often as possible. “Regularly update operating systems, apps, and security software to protect against vulnerabilities,” urges Collard. She also suggests speaking to your children about recognising scams and the risks of clicking on unknown links.

“Make rules regarding the downloading and purchasing of apps,” she advises. “Children should get permission before downloading any new app or making in-app purchases to prevent unintended expenses and the installation of potentially unsafe apps.”

Other suggestions to improve cybersecurity include making sure parents log out of their profiles before sharing a device with their kids. “When watching a streaming service, parents should ensure their children are accessing it using their profile to avoid exposure to inappropriate content.”

She also recommends securing your home Wi-Fi network with a strong password and to limit the use of the administrator’s account. Only parents should have access to the administrator account, never kids. This will prevent access to inappropriate content, sites, or them installing malware that might overwrite all your files and gain access to your accounts.”

Enable multi-factor authentication (MFA) for online accounts as an extra precaution. “This will add another layer of security even if someone else has access to saved passwords on shared devices,” she says.

Finally, it is important to have honest and open communication with everyone in the family. “Discuss and review the agreement on screen time regularly, as well as the importance of digital safety,” Collard concludes. “If something goes wrong, children need to tell their parents. In turn, parents should model the online behaviour they expect from their kids, from maintaining privacy and security practices to being respectful digital citizens.”




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...
Continuous security optimisation.
News & Events Information Security
Cymulate has announced its partnership with SentinelOne, a threat exposure validation and AI-powered cybersecurity platform. The collaboration delivers self-healing endpoint security that empowers businesses to increase protection for every endpoint on their network.

Read more...
Protect your smart home devices
Kaspersky IoT & Automation Information Security Smart Home Automation
Voice assistants, kitchen robots, smart lights and many other intelligent devices have become part of our everyday life. However, with the rise of smart technology comes the need for robust protection against potential vulnerabilities.

Read more...
ISPA’s take-down process protects from local scams
News & Events Information Security
During the recent school holidays, parents could rest a little easier knowing that ISPA, SA’s official internet industry representative body, is removing an average of three to four problematic websites from the local internet every week.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.