What We Like About Android’s Latest Security Additions

Android 16 is now officially available for device manufacturers to implement, introducing significant enhancements to security through a new mode: Advanced Protection. Let’s focus on these enhancements and how they have altered a user’s built-in security within the operating system. 

What is Advanced Protection?

If you’re especially on the ball, you may have stopped and thought, “Wait, wasn’t there already a security feature called Advanced Protection?”

If you did, you’d be right.

Google already offers an Advanced Protection program, but it differs from the one we’re focusing on in three key ways. 

  1. The first one was intended to protect the user’s Google account specifically, whereas this one is designed for the Android ecosystem as a whole.
  2. The preexisting one was explicitly meant for those with advanced security needs, as it required a physical key to access a Google account.
  3. The existing Advanced Protection was much more exclusionary towards third-party applications… which is great for those at higher risk, but may be overkill for the average user.

Of course, we in no way mean to imply that the new Advanced Protection enhancements fall short—far from it. They simply focus more on the kinds of threats that everyone is most likely to face, and as a result, are designed to be more accessible and user-friendly.

How much more?

Advanced Protection is Available Via a Single Switch

In standard Android, the Security & Privacy section of the Settings has a new section added, fittingly called Advanced Protection, with just a single on/off toggle. Activating it is as simple as flipping a single switch, but there is the option to select such protections on a more piecemeal basis.

Despite this Simplicity, Advanced Protection Enables a Lot

Make no mistake, this update is clearly about making improved security more accessible to the average user without adding any additional stress. By working in the background to adjust specific key settings and adding new features, Advanced Protection more effectively enforces some basic security best practices. For instance…

  • A device that has been left locked for 72 hours will automatically restart, ensuring that all data is unreadable until the passcode is entered.
  • Devices that are offline for extended periods will automatically lock.
  • Calls will be automatically screened to identify potential spam.
  • 2G networks will no longer be supported.
  • Some devices will only charge through the USB connection when locked, nothing else.

While not all of these features are available on all devices or are still works in progress, this is far from a comprehensive list of what Google is implementing through this change, with more planned to roll out as time passes.

We’re Always Glad to See Additional Security Measures Added to Android—and Everywhere

These kinds of improvements should be welcomed everywhere, but especially by businesses. Advanced Protection can be enabled via an Android device’s work profile, as Google recommends doing for particularly targeted roles or groups.

That said, this is far from all that can (or, crucially, should) be done to secure a modern business and its technology. Modern cyberthreats come from all directions, which makes it essential to have as comprehensive security coverage as you can manage… and remember, you don’t have to manage it alone. 

White Mountain IT Services is here for the businesses of New Hampshire, ready to work with you to see to your organization’s business technology needs. Reach out to us at (603) 889-0800 to learn more about how we can help you accomplish your goals while keeping your critical IT systems secure and maintained.

Related Posts

Modern Cybersecurity Depends on Building Resilience with Zero Trust

The world of cybersecurity is in constant flux, demanding that organizations continually reassess their defensive strategies. A traditional focus solely on preventing breaches, while important, is proving insufficient in the face of sophisticated and persistent threats. As highlighted in a recent Illumio podcast episode, "Trust & Resilience: The New Frontlines of Cybersecurity," the very found...

How You and Your Team Can Better Protect Your Business

Technology is woven into almost everything we do, from collaborating on projects to connecting with clients. Making sure we handle this technology correctly is important for the efficiency and security of your entire business. In this month’s newsletter, we just wanted to go through a couple of actions that can help any professional improve their technology. Here are four foundational tech tips...

Is Your Organization Prepared to Invest What is Needed into Cybersecurity?

Safeguarding your business' infrastructure from various threats is a well-known imperative. In discussions about network security, the term "endpoint" frequently arises. Exploring the significance of securing all endpoints is the focus of today's article. Commencing with an elucidation of what constitutes an endpoint, we define it as "any device connected to a network capable of serving as a po...

Update Your Computers’ OS to Keep Your Business Humming Along

An operating system is the main program on any device, like a computer, phone, or tablet, that helps it work. It's what lets you open apps, go online, and get stuff done! For businesses, keeping their OS updated is super important. Here’s why: Security Comes First Hackers are always finding new ways to sneak into computers and steal data. If a business has important information, like customer ...