What We Like About Android’s Latest Security Additions

Android 16 is now officially available for device manufacturers to implement, introducing significant enhancements to security through a new mode: Advanced Protection. Let’s focus on these enhancements and how they have altered a user’s built-in security within the operating system. 

What is Advanced Protection?

If you’re especially on the ball, you may have stopped and thought, “Wait, wasn’t there already a security feature called Advanced Protection?”

If you did, you’d be right.

Google already offers an Advanced Protection program, but it differs from the one we’re focusing on in three key ways. 

  1. The first one was intended to protect the user’s Google account specifically, whereas this one is designed for the Android ecosystem as a whole.
  2. The preexisting one was explicitly meant for those with advanced security needs, as it required a physical key to access a Google account.
  3. The existing Advanced Protection was much more exclusionary towards third-party applications… which is great for those at higher risk, but may be overkill for the average user.

Of course, we in no way mean to imply that the new Advanced Protection enhancements fall short—far from it. They simply focus more on the kinds of threats that everyone is most likely to face, and as a result, are designed to be more accessible and user-friendly.

How much more?

Advanced Protection is Available Via a Single Switch

In standard Android, the Security & Privacy section of the Settings has a new section added, fittingly called Advanced Protection, with just a single on/off toggle. Activating it is as simple as flipping a single switch, but there is the option to select such protections on a more piecemeal basis.

Despite this Simplicity, Advanced Protection Enables a Lot

Make no mistake, this update is clearly about making improved security more accessible to the average user without adding any additional stress. By working in the background to adjust specific key settings and adding new features, Advanced Protection more effectively enforces some basic security best practices. For instance…

  • A device that has been left locked for 72 hours will automatically restart, ensuring that all data is unreadable until the passcode is entered.
  • Devices that are offline for extended periods will automatically lock.
  • Calls will be automatically screened to identify potential spam.
  • 2G networks will no longer be supported.
  • Some devices will only charge through the USB connection when locked, nothing else.

While not all of these features are available on all devices or are still works in progress, this is far from a comprehensive list of what Google is implementing through this change, with more planned to roll out as time passes.

We’re Always Glad to See Additional Security Measures Added to Android—and Everywhere

These kinds of improvements should be welcomed everywhere, but especially by businesses. Advanced Protection can be enabled via an Android device’s work profile, as Google recommends doing for particularly targeted roles or groups.

That said, this is far from all that can (or, crucially, should) be done to secure a modern business and its technology. Modern cyberthreats come from all directions, which makes it essential to have as comprehensive security coverage as you can manage… and remember, you don’t have to manage it alone. 

White Mountain IT Services is here for the businesses of New Hampshire, ready to work with you to see to your organization’s business technology needs. Reach out to us at (603) 889-0800 to learn more about how we can help you accomplish your goals while keeping your critical IT systems secure and maintained.

Related Posts

What Does Your Cybersecurity Training Need to Include?

As we stand on the threshold of a new year, it’s worth noting that the term "cybersecurity" didn't even enter the common lexicon until the late 1980s. Before that, we just called it "computer security"—mostly involving locking the server room door and hoping nobody guessed the password was "admin." Fast forward to today, and the game has changed entirely. "Hoping for the best" is no longer a viab...

Maintaining Data Security Is the Most Important Tip We Can Give You

Tips are great as long as they actually work. Business owners need more technology tips than just about anything else, whether that is app-specific or general care of technology. We try to do our best to provide useful tips a couple of times a month, but this week we wanted to focus on what is probably the most important tip we can provide. The most important tip for business computing is to pr...

You Can Embrace Remote Operations Without Sacrificing Cybersecurity… It Just Needs to Be Done Right

Remote work has proven incredibly useful over the past few years despite many employers having various concerns about its implementation. While these concerns vary, one prevalent one is how remote operations impact cybersecurity. If you’re utilizing remote operations to any degree and aren’t concerned about cybersecurity, you must adjust this mindset and correct your approach. How Does Remote ...

Tip of the Week: Three Steps to Policing Your IT Policies

Small businesses are presented with the challenging prospect of monitoring and policing various IT-related policies that you might have for your network infrastructure and workplace technology use. The difficulty of this notion does little to lessen its importance, however. You need to take action to protect your assets, data, and reputation from the countless threats out there, and ensuring that ...