How to effectively share household devices

August 2024 Smart Home Automation, Information Security


Anna Collard

It is a familiar scene in South Africa: multiple household members sharing a single device. Due to social and economic challenges, many parents cannot afford to provide each child with a cell phone, tablet, or computer, leading to the eight hours per day online, making device sharing among family members commonplace. However, what are the potential drawbacks and dangers associated with this extensive device use and sharing among parents and siblings?

To navigate this issue successfully, Anna Collard, SVP Content Strategy and Evangelist at KnowBe4 Africa, urges the importance of establishing clear boundaries to prevent conflicts.

“Create a family agreement where you set up some clear guidelines for technology use,” she says. “You should establish rules for when and how long each family member can use the device and what for.” A great site with helpful resources and a family agreement template can be found at Childnet.

Collard recommends having set times for device usage. “Remember, children often need access to screens to do their homework, so this needs to be given a separate time allocation from leisure screen time, such as watching TV or gaming.” Certain times, like mealtimes and other family connection times, should be device-free.

Devices should also be put away at night. “By designating a central location for charging devices overnight, you ensure devices are charged for the next day, and it also encourages unplugging before bedtime.”

Ensure strong privacy settings

If devices are shared, it is paramount to create some virtual boundaries. “Ensure that each user has their own account and understands privacy settings,” advises Collard. “For example, personal email accounts, social media profiles and cloud storage should be separate.”

The importance of individual user profiles for each family member is to keep personal data, documents, and settings separate and secure. “Each profile should require a password that only the owner knows; parents should know the passwords of their younger kids,” she comments. “Use parental control features to restrict access to inappropriate content and to manage screen time and app usage. This not only protects children but also helps to reinforce the family’s screen-time rules.”

Collard recommends regularly going through apps and privacy settings with your children. “This is a good opportunity to discuss what these apps and settings do and why privacy is crucial,” she says. “Monitor the device’s browsing history to ensure that children adhere to the agreed-upon rules and do not engage with harmful content.”

Keep cybersecurity top of mind

For online safety, update software on shared devices as often as possible. “Regularly update operating systems, apps, and security software to protect against vulnerabilities,” urges Collard. She also suggests speaking to your children about recognising scams and the risks of clicking on unknown links.

“Make rules regarding the downloading and purchasing of apps,” she advises. “Children should get permission before downloading any new app or making in-app purchases to prevent unintended expenses and the installation of potentially unsafe apps.”

Other suggestions to improve cybersecurity include making sure parents log out of their profiles before sharing a device with their kids. “When watching a streaming service, parents should ensure their children are accessing it using their profile to avoid exposure to inappropriate content.”

She also recommends securing your home Wi-Fi network with a strong password and to limit the use of the administrator’s account. Only parents should have access to the administrator account, never kids. This will prevent access to inappropriate content, sites, or them installing malware that might overwrite all your files and gain access to your accounts.”

Enable multi-factor authentication (MFA) for online accounts as an extra precaution. “This will add another layer of security even if someone else has access to saved passwords on shared devices,” she says.

Finally, it is important to have honest and open communication with everyone in the family. “Discuss and review the agreement on screen time regularly, as well as the importance of digital safety,” Collard concludes. “If something goes wrong, children need to tell their parents. In turn, parents should model the online behaviour they expect from their kids, from maintaining privacy and security practices to being respectful digital citizens.”




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Onyyx wireless alarm
Technews Publishing Editor's Choice Smart Home Automation
IDS has introduced Onyyx, a wireless alarm system engineered to provide complete system control via the Onyyx app or keyring, as well as seamless installation.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Unlocking new efficiencies in private security
Security Services & Risk Management Transport (Industry) Smart Home Automation Logistics (Industry)
Justin Manson, Sales Director at Webfleet, discusses how the urgent need to protect life, and to do so more efficiently, is driving continuous innovation in holistic home and residential security services in South Africa.

Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.

Read more...
New tools for investigation and robust infrastructure security
News & Events Information Security
Cybereason continues to enhance its security platform, with recent updates introducing improvements in file search operations, investigation query results, and cloud workload protection, providing more granular data and faster key artefact identification.

Read more...
Acronis’ True Image returns
Information Security Smart Home Automation
Acronis has announced its flagship product, Acronis Cyber Protect Home Office, is reverting to its original name, Acronis True Image, with the new version release.

Read more...
Panasonic Industry offers multi-tier Matter Certificate Service
Smart Home Automation IoT & Automation
Panasonic Industry Europe is now offering PAN-MaX, a multi-tier Matter Certificate Service designed for device manufacturers selling in the smart home market, to simplify Matter enablement for smart home devices.

Read more...
Same old cables, new intercom
Hikvision South Africa Products & Solutions Access Control & Identity Management Residential Estate (Industry) Smart Home Automation
Retrofitting old residential complexes with a modern two-wire HD video intercom system is more than an upgrade. For many homeowners and renters, these systems represent a leap into the future.

Read more...
NEC XON shares lessons learned from ransomware attacks
NEC XON Editor's Choice Information Security
NEC XON has handled many ransomware attacks. We've distilled key insights and listed them in this article to better equip companies and individuals for scenarios like this, which many will say are an inevitable reality in today’s environment.

Read more...