What We Like About Android’s Latest Security Additions

Android 16 is now officially available for device manufacturers to implement, introducing significant enhancements to security through a new mode: Advanced Protection. Let’s focus on these enhancements and how they have altered a user’s built-in security within the operating system. 

What is Advanced Protection?

If you’re especially on the ball, you may have stopped and thought, “Wait, wasn’t there already a security feature called Advanced Protection?”

If you did, you’d be right.

Google already offers an Advanced Protection program, but it differs from the one we’re focusing on in three key ways. 

  1. The first one was intended to protect the user’s Google account specifically, whereas this one is designed for the Android ecosystem as a whole.
  2. The preexisting one was explicitly meant for those with advanced security needs, as it required a physical key to access a Google account.
  3. The existing Advanced Protection was much more exclusionary towards third-party applications… which is great for those at higher risk, but may be overkill for the average user.

Of course, we in no way mean to imply that the new Advanced Protection enhancements fall short—far from it. They simply focus more on the kinds of threats that everyone is most likely to face, and as a result, are designed to be more accessible and user-friendly.

How much more?

Advanced Protection is Available Via a Single Switch

In standard Android, the Security & Privacy section of the Settings has a new section added, fittingly called Advanced Protection, with just a single on/off toggle. Activating it is as simple as flipping a single switch, but there is the option to select such protections on a more piecemeal basis.

Despite this Simplicity, Advanced Protection Enables a Lot

Make no mistake, this update is clearly about making improved security more accessible to the average user without adding any additional stress. By working in the background to adjust specific key settings and adding new features, Advanced Protection more effectively enforces some basic security best practices. For instance…

  • A device that has been left locked for 72 hours will automatically restart, ensuring that all data is unreadable until the passcode is entered.
  • Devices that are offline for extended periods will automatically lock.
  • Calls will be automatically screened to identify potential spam.
  • 2G networks will no longer be supported.
  • Some devices will only charge through the USB connection when locked, nothing else.

While not all of these features are available on all devices or are still works in progress, this is far from a comprehensive list of what Google is implementing through this change, with more planned to roll out as time passes.

We’re Always Glad to See Additional Security Measures Added to Android—and Everywhere

These kinds of improvements should be welcomed everywhere, but especially by businesses. Advanced Protection can be enabled via an Android device’s work profile, as Google recommends doing for particularly targeted roles or groups.

That said, this is far from all that can (or, crucially, should) be done to secure a modern business and its technology. Modern cyberthreats come from all directions, which makes it essential to have as comprehensive security coverage as you can manage… and remember, you don’t have to manage it alone. 

White Mountain IT Services is here for the businesses of New Hampshire, ready to work with you to see to your organization’s business technology needs. Reach out to us at (603) 889-0800 to learn more about how we can help you accomplish your goals while keeping your critical IT systems secure and maintained.

Related Posts

How You and Your Team Can Better Protect Your Business

Technology is woven into almost everything we do, from collaborating on projects to connecting with clients. Making sure we handle this technology correctly is important for the efficiency and security of your entire business. In this month’s newsletter, we just wanted to go through a couple of actions that can help any professional improve their technology. Here are four foundational tech tips...

How to Ditch Sticky Note Passwords for Good

How many employees do you have who keep your company’s passwords on sticky notes stuck to their monitors? This simple, seemingly benign trick could be putting your business at risk. After all, if you can see the password on a sticky note, so too can others who happen to be wandering around the office—including potential threat actors. This System is Putting Your Business at Risk If your employ...

Secure Your Business: How Password Managers Simplify Cybersecurity

If you're like many small and medium-sized business owners, you're juggling countless online passwords… for email, banking, software, supplier portals, and more. It's overwhelming! This often leads to using simple or repeated passwords, which unfortunately opens the door to cyber threats like data breaches, a serious risk for any business. Thankfully, there's a straightforward solution: a password...

How to Avoid Becoming the Next Data Security Cautionary Tale

Data security isn’t a matter to be taken lightly, as too many businesses have found out the hard way. Unfortunately, there are far too many simple ways to correct common security issues - enough that it’s foolish not to do so. We’ll review a few ways to fix security issues, after discussing one of, if not the, most egregious security failings in modern history. The Equifax Problem Sometime bet...