What We Like About Android’s Latest Security Additions

Android 16 is now officially available for device manufacturers to implement, introducing significant enhancements to security through a new mode: Advanced Protection. Let’s focus on these enhancements and how they have altered a user’s built-in security within the operating system. 

What is Advanced Protection?

If you’re especially on the ball, you may have stopped and thought, “Wait, wasn’t there already a security feature called Advanced Protection?”

If you did, you’d be right.

Google already offers an Advanced Protection program, but it differs from the one we’re focusing on in three key ways. 

  1. The first one was intended to protect the user’s Google account specifically, whereas this one is designed for the Android ecosystem as a whole.
  2. The preexisting one was explicitly meant for those with advanced security needs, as it required a physical key to access a Google account.
  3. The existing Advanced Protection was much more exclusionary towards third-party applications… which is great for those at higher risk, but may be overkill for the average user.

Of course, we in no way mean to imply that the new Advanced Protection enhancements fall short—far from it. They simply focus more on the kinds of threats that everyone is most likely to face, and as a result, are designed to be more accessible and user-friendly.

How much more?

Advanced Protection is Available Via a Single Switch

In standard Android, the Security & Privacy section of the Settings has a new section added, fittingly called Advanced Protection, with just a single on/off toggle. Activating it is as simple as flipping a single switch, but there is the option to select such protections on a more piecemeal basis.

Despite this Simplicity, Advanced Protection Enables a Lot

Make no mistake, this update is clearly about making improved security more accessible to the average user without adding any additional stress. By working in the background to adjust specific key settings and adding new features, Advanced Protection more effectively enforces some basic security best practices. For instance…

  • A device that has been left locked for 72 hours will automatically restart, ensuring that all data is unreadable until the passcode is entered.
  • Devices that are offline for extended periods will automatically lock.
  • Calls will be automatically screened to identify potential spam.
  • 2G networks will no longer be supported.
  • Some devices will only charge through the USB connection when locked, nothing else.

While not all of these features are available on all devices or are still works in progress, this is far from a comprehensive list of what Google is implementing through this change, with more planned to roll out as time passes.

We’re Always Glad to See Additional Security Measures Added to Android—and Everywhere

These kinds of improvements should be welcomed everywhere, but especially by businesses. Advanced Protection can be enabled via an Android device’s work profile, as Google recommends doing for particularly targeted roles or groups.

That said, this is far from all that can (or, crucially, should) be done to secure a modern business and its technology. Modern cyberthreats come from all directions, which makes it essential to have as comprehensive security coverage as you can manage… and remember, you don’t have to manage it alone. 

White Mountain IT Services is here for the businesses of New Hampshire, ready to work with you to see to your organization’s business technology needs. Reach out to us at (603) 889-0800 to learn more about how we can help you accomplish your goals while keeping your critical IT systems secure and maintained.

Related Posts

If Your Business’ Technology Isn’t Working, Your Business Isn’t Either

Most businesses rely on their technology. However, a failure to manage that technology can lead to significant financial waste and operational inefficiencies. One major way a business can waste money is through over-investment in unnecessary or overly complex IT infrastructure. Let’s briefly examine how companies waste their money on technology and how to identify if technology is working for your...

It Pays to Invest in Security Awareness Training… Here’s What to Include

Security awareness training is a critical process for modern businesses to undergo to have any chance of success. Unfortunately, as much as security software or policy can help, it can only do so much. You also need your team members to be on board, knowledgeable about what they need to do, and motivated to do it.  In light of this, let’s talk about security awareness training and what it ne...

A Man-in-the-Middle Attack is Not to Be Underestimated

Have you ever heard of the “man-in-the-middle” attack or MitM? It’s a situation where your data is stolen by an onlooker who situates themselves in the right place at the right time. Data interception is a very real thing that your business should be prepared to fight against. Let’s discuss some strategies you can use to counter these sneaky attacks. How a Man-in-the-Middle Attack Works For a ...

Modern Cybersecurity Depends on Building Resilience with Zero Trust

The world of cybersecurity is in constant flux, demanding that organizations continually reassess their defensive strategies. A traditional focus solely on preventing breaches, while important, is proving insufficient in the face of sophisticated and persistent threats. As highlighted in a recent Illumio podcast episode, "Trust & Resilience: The New Frontlines of Cybersecurity," the very found...