Episode Summary: Don't Make Rules – Make Conversations: Raising Cyber-Smart Kids
Podcast: Healthy Screen Habits
Host: Hillary Wilkinson
Guests: Chad Richliewski & Kay David, Cyber Security Parents LLC
Date: February 4, 2026
Episode Overview
This episode centers on empowering parents to raise “cyber-smart” kids by moving away from rigid tech “rules” and prioritizing ongoing, open conversations about digital safety, privacy, and habits. Hillary Wilkinson invites Chad Richliewski and Kay David, authors of Cyber Smart Parenting: Protecting Your Child in the Digital Age, to discuss actionable strategies for families navigating technology. The conversation unpacks how to demystify cybersecurity topics, create approachable family tech plans, and foster resilient, digitally literate children.
Key Discussion Points and Insights
The Problem with “Rules”—Why Conversations Matter
- Rules vs. Conversations:
- Chad stresses the importance of explaining the “why” behind family technology guidelines, making them about understanding rather than control ([00:00], [09:34]).
- Quote: “We don't want to make rules, we want to have a conversation. Explain to your children why they can get their device for so many hours… Then it's not just because I said so.” — Chad Richliewski [00:00]
- Chad stresses the importance of explaining the “why” behind family technology guidelines, making them about understanding rather than control ([00:00], [09:34]).
- Conversation Starters:
- Kay reveals research showing parents only spend an average of 46 minutes during their child’s life talking about online security ([03:07]).
- Quote: “On average, parents only spend a total of 46 minutes talking to their children about online security through their entire childhood.” — Kay David [03:07]
- Their book includes conversation prompts at each chapter's end to help parents discuss topics like passwords and digital footprints.
- Kay reveals research showing parents only spend an average of 46 minutes during their child’s life talking about online security ([03:07]).
Making Cybersecurity Approachable for Parents
-
Breaking Down Complex Topics:
- The book distills intimidating cybersecurity concepts into simple, actionable language designed for busy parents ([01:56], [02:38]).
- Chad shares that checklists and conversation guides are tailored by age—kindergarteners to teens—providing evolving guidance ([05:24]).
-
“Drips, Not Drownings” Approach:
- Both guests and the host emphasize the effectiveness of consistent, bite-sized conversations rather than overwhelming info dumps ([04:19]).
Adapting to Children’s Changing Digital Lives
- Tech Evolves with Age:
- Technology guidance must shift as children grow: from talking passwords in early years to digital presence and job applications for teens ([05:24], [06:07]).
- Practical, actionable checklists at each chapter's end help parents stay engaged at every stage.
Family Tech Plans: There’s No “One-Size-Fits-All”
- Guidance Over Prescription:
- Hillary compares family tech plans to cars: the right one depends on family needs ([10:44]).
- Chad recommends using their book’s tech contract as a flexible, discussion-based tool rather than a rigid set of rules ([09:34], [10:44]).
Digital Safety Tools Explained: VPNs & Routers
-
What is a VPN?
- Kay educates listeners by breaking down the concept of Virtual Private Networks and their purpose: creating an encrypted, private tunnel between device and internet ([12:39]).
- Quote: “A VPN allows that private tunnel, so you can actually choose… where you’re coming from. It doesn’t necessarily show your location, and it doesn’t show your device specifically.” — Kay David [14:35]
- Kay educates listeners by breaking down the concept of Virtual Private Networks and their purpose: creating an encrypted, private tunnel between device and internet ([12:39]).
-
Layered Digital Protection:
- VPNs are an additional layer, not a substitute for secure networks. Kay likens it to locking your door and also setting the house alarm ([16:01]).
- Quote: “You don’t want to just rely on locking the door to protect your house.… You want multiple levels of protection.” — Kay David [16:01]
- VPNs are an additional layer, not a substitute for secure networks. Kay likens it to locking your door and also setting the house alarm ([16:01]).
-
Is Setting Up a VPN Really Five Easy Steps?
- Kay confirms the process is straightforward; the main complexity is choosing the right solution for your family’s needs — much like picking the right car ([18:35]).
- Example: Kay prefers NordVPN for international travel, but families should consider their specific scenarios ([18:35]).
- Kay confirms the process is straightforward; the main complexity is choosing the right solution for your family’s needs — much like picking the right car ([18:35]).
Memorable Quotes
-
Chad Richliewski [00:00 & 09:34]:
- “We don't want to make rules, we want to have a conversation. Explain to your children why they can get their device for so many hours… Then it's not just because I said so.”
-
Kay David [03:07]:
- “On average, parents only spend a total of 46 minutes talking to their children about online security through their entire childhood.”
-
Hillary Wilkinson [04:19]:
- “It’s lots of little conversations all along the way.… You cannot drink a gallon of water on Sunday and think you’re gonna be fine come Wednesday.”
-
Kay David [16:01]:
- “You don’t want to just rely on locking the door to protect your house. You want multiple levels of protection.”
Important Timestamps
- 00:00 – 01:00: Why conversation beats rules in raising cyber-smart kids.
- 03:07: Shocking stat—parents' minimal time talking about online security.
- 05:24 – 06:07: Age-specific digital guidance and practical checklists.
- 09:34 – 10:44: Golden rule for parenting: make tech plans a conversation, not a dictate.
- 12:39 – 16:01: What is a VPN? Layered protection in plain language.
- 18:35: Choosing and setting up a VPN really can (usually) take just five main steps.
- 22:46: Chad’s “common area rule” (first floor rule) as a tangible healthy screen habit.
Healthy Screen Habit: The "Common Area Rule"
Chad’s takeaway for families ([22:46]):
- Devices stay in common areas—never in private bedrooms, especially at night.
- At bedtime, all devices go into a basket in the main living space to charge.
- Quote: “Devices don’t need to leave those common areas. Devices shouldn’t go to the rooms at night…. All the bedrooms are upstairs. We have a basket on the counter where the devices live before everyone goes upstairs at night.” — Chad Richliewski [22:46]
- This routine breaks the habit of continuous digital connection and encourages greater family presence.
Final Thoughts
The episode powerfully reframes digital safety as an ongoing family conversation—not an exercise in rule-setting or policing. By demystifying key tools (like VPNs), advocating layered digital protection, and supplying both practical guides and age-tailored talking points, Chad and Kay equip parents with confidence and clarity amidst fast-evolving tech challenges. Their collaborative message: Stay curious, communicate often, and let your tech guidelines grow with your family.
For more:
- Visit Healthy Screen Habits.org for transcripts, episode links, and resources.
- Explore Chad and Kay’s book: Cyber Smart Parenting: Protecting Your Child in the Digital Age
- Visit Cyber Security Parents LLC for practical blog posts and further guides.
