<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.teleiostechnologies.com/blogs/feed" rel="self" type="application/rss+xml"/><title>Teleios Technologies - Blog</title><description>Teleios Technologies - Blog</description><link>https://www.teleiostechnologies.com/blogs</link><lastBuildDate>Sat, 25 Apr 2026 06:14:12 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Teleios Technologies Achieves Generative AI Certification]]></title><link>https://www.teleiostechnologies.com/blogs/post/Teleios-Technologies-Achieves-Generative-AI-Certification</link><description><![CDATA[<img align="left" hspace="5" src="https://www.teleiostechnologies.com/BSN- Gen AI Certification Partner Exclusive Email Signature Banner-01.png"/>FOR IMMEDIATE RELEASE Teleios Technologies, LLC 765-726-2849 info@teleiostechnologies.com Teleios Technologies Achieves Generative AI Certification from B ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_QH4sA0lWSnqYzy-gjVThpw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_JlcOANXzQmKJEzqCaEmrAQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_BQnrmnS0Ro-NQCOPHQ3tVg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_7Ox5GPENJYuChDvGD5VqOg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid " data-divider-border-color><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_tnnIupaLeInE8P3cUXX6fQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_tnnIupaLeInE8P3cUXX6fQ"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_tnnIupaLeInE8P3cUXX6fQ"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_IyjXUS4ZSEKIMPexflIqUQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-justify zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><p>FOR IMMEDIATE RELEASE</p><p>Teleios Technologies, LLC</p><p>765-726-2849</p><p>info@teleiostechnologies.com</p><p><br></p><p><span style="font-weight:700;font-style:inherit;">Teleios Technologies Achieves Generative AI Certification from Breach Secure Now to Lead Clients in Secure, Strategic AI Adoption</span></p><p><span style="font-weight:700;font-style:inherit;"><br></span></p><p><span style="font-weight:700;font-style:inherit;">Eaton, IN – September 2, 2025</span>&nbsp;– Teleios Technologies, LLC, a trusted provider of managed IT and cybersecurity services, is proud to announce that we are now Generative AI Certified by Breach Secure Now (BSN). BSN is a leading provider of human-centric cybersecurity, AI awareness, and productivity training. This industry-first certification empowers our team to confidently lead clients through the complexities of AI adoption - safely, strategically, and securely.</p><p><br></p><p>“As AI becomes integrated into the workplace through platforms like Microsoft 365, CRMs, and more, our clients need more than just support - they need strategic guidance,” said Braden Drown, President at Teleios Technologies. “This market advantage certification gives us the knowledge and tools to guide them through the risks and opportunities of AI in a way that’s responsible, scalable, and tailored to their business.”</p><p><br></p></div>
<p></p><h3 style="font-weight:400;"><span style="font-weight:700;font-style:inherit;font-size:24px;">Why This Certification Matters</span></h3><p></p><div><h3 style="font-weight:400;"></h3><p><br></p><p>AI is rapidly transforming how businesses operate, but without proper strategy, training, and governance, it also introduces real risks. As a&nbsp;<span style="font-weight:700;font-style:inherit;">BSN Generative AI Certified Partner</span>, Teleios Technologies can now:</p><ul><li style="font-weight:inherit;font-style:inherit;"><span style="font-weight:700;font-style:inherit;">Deliver Trusted AI Guidance</span><br style="font-weight:inherit;font-style:inherit;"> We help clients navigate AI’s impact on their organization, providing clear direction on how to safely explore and implement AI tools.</li><li style="font-weight:inherit;font-style:inherit;"><span style="font-weight:700;font-style:inherit;">Support Customized AI Strategies</span><br style="font-weight:inherit;font-style:inherit;"> Using BSN’s&nbsp;<span style="font-weight:700;font-style:inherit;">AI Readiness Innovation Assessment&nbsp;</span><a href="https://breachsecurenow.com/products/ai/airia/"><span style="font-weight:700;font-style:inherit;">(AIRIA)</span></a>&nbsp;framework, we assess each client’s unique environment to identify opportunities where AI can automate tasks, increase efficiency, and drive innovation.</li><li style="font-weight:inherit;font-style:inherit;"><span style="font-weight:700;font-style:inherit;">Train Teams with a Cybersecurity-First Mindset</span><br style="font-weight:inherit;font-style:inherit;"> AI is powerful—but it also opens the door to new cybersecurity threats. We deliver AI Awareness Training that empowers your team to use AI productively and safely, with a clear understanding of what data is safe to share and how to recognize AI-driven scams.</li></ul><div><br></div>
<h3 style="font-weight:400;"><span style="font-weight:700;font-style:inherit;font-size:24px;">What This Means for Our Clients</span></h3><p><br></p><p>As a certified partner, Teleios Technologies is uniquely positioned to help clients:</p><ul><li style="font-weight:inherit;font-style:inherit;">Embrace AI and understand its real-world applications</li><li style="font-weight:inherit;font-style:inherit;">Develop and implement secure AI policies</li><li style="font-weight:inherit;font-style:inherit;">Reduce risks associated with ungoverned AI use (e.g., ChatGPT, Copilot)</li><li style="font-weight:inherit;font-style:inherit;">Build internal confidence in using AI tools across departments</li><li style="font-weight:inherit;font-style:inherit;">Drive measurable business outcomes through automation and innovation</li></ul><p><br></p><p>“Generative AI is one of the most transformative technologies of our time,” added Drown. “With our BSN certification, we’re not just reacting to an industry movement - we’re helping our clients lead through it.”</p><p><br></p><p>We invite businesses looking to embrace AI responsibly to connect with us. As a certified partner, Teleios Technologies is ready to help your team understand, plan, and execute a secure, high-impact AI strategy.</p><p><span style="font-weight:700;font-style:inherit;"><br></span></p><p><span style="font-weight:700;font-style:inherit;">Contact us</span>&nbsp;today at&nbsp;<a href="/contact" title="teleiostechnologies.com/contact" rel="">teleiostechnologies.com/contact</a>&nbsp;to start a conversation about how AI can support your growth - safely and confidently.</p><p><span style="font-weight:700;font-style:inherit;"><br></span></p><p><span style="font-weight:700;font-style:inherit;">About Teleios Technologies, LLC</span>: Teleios Technologies is a full-service managed I.T. services company serving small businesses, but with a specialty in healthcare, financial services, and non-profit organizations. The company was founded to deliver secure, simplified IT solutions tailored to small businesses. Built on a foundation of IT compliance expertise and a commitment to making technology accessible, they developed a service model that seamlessly integrates support, cybersecurity, disaster recovery, and CIO services. Teleios Technologies takes a holistic approach, enabling clients to confidently operate in a secure digital environment. By emphasizing clear communication, they simplify complex technological challenges, empowering clients to make informed decisions. Looking ahead, Teleios Technologies is dedicated to leveraging emerging technologies, including AI, to ensure its clients remain at the forefront of innovation.</p><p><br></p><p>In 2024, Teleios Technologies won Silver in the IT/Office Technology category of Muncie’s Quest for the Best competition, where residents choose their favorite local businesses. Teleios Technologies is also a member of the National Society of IT Service Providers, an organization dedicated to ensuring high standards and ethics among IT professionals.</p></div>
</div></div><div data-element-id="elm_Y1_LBnbKcHSD_mNOsqfwaQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid " data-divider-border-color><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_9P1WrIUsRslBb9H9y9lNyA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_9P1WrIUsRslBb9H9y9lNyA"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_9P1WrIUsRslBb9H9y9lNyA"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Tue, 02 Sep 2025 08:01:00 -0400</pubDate></item><item><title><![CDATA[PowerSchool Breach - What We Know]]></title><link>https://www.teleiostechnologies.com/blogs/post/Teleios-Technologies-Achieves-Generative-AI-Certification1</link><description><![CDATA[Another day, another data breach. PowerSchool, a major education technology platform, has alerted its over 18,000 customers that hackers were able to ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_6XmQ2_12REWFnys3X_LS9A" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_kT-k6EqQTpW_mJDKcLkYBw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_uD_5FpsVSuq-gbltgkyWZg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_TNujC9UaS7QMjkkkZb2etg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid " data-divider-border-color><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_M9J8mBMSQS6d6zXalxLUjg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-justify zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><p>Another day, another data breach. PowerSchool, a major education technology platform, has alerted its over 18,000 customers that hackers were able to access and download highly sensitive information about customers (the schools), school staff, and students (Here is a&nbsp;<a href="https://go.powerschool.com/index.php/email/emailWebview?email=ODYxLVJNSS04NDYAAAGX54SCHJyJDTiMCENPXALMSEBHwqUJTXSRPNfwxwvH547XtpWRshMqFh48M-kYTHHck-yogqLY68bc9amiiDZjqH7OF0yBA2Haig">link to the email</a>&nbsp;that PowerSchool sent out to notify affected school districts).</p><p><br></p><p><span style="font-weight:700;font-style:inherit;">What happened?</span></p><p>According to information obtained by&nbsp;<a href="https://techcrunch.com/2025/01/09/powerschool-says-hackers-stole-students-sensitive-data-including-social-security-numbers-in-data-breach/">TechCrunch</a>, the information downloaded by hackers primarily included contact information, such as individuals' names, addresses, phone numbers parents' names, phone numbers, and email addresses, some medical and grade information, and Social Security numbers. Hackers were also able to access other "unspecified personally identifiable information." The types of data stolen will vary by customer. TechCrunch also reported that the breach did not involve ransomware, but rather a cyber-extortion event where a sum was paid to the attackers to prevent the stolen information from being published online.</p><p><br></p><p><span style="font-weight:700;font-style:inherit;">How did it happen?</span></p><p><a href="https://www.edtechirl.com/p/the-powerschool-data-breach-what">EdTech IRL</a>&nbsp;has a good write-up, although a bit technical, on how the attackers gained access to PowerSchool. There are a number of factors that contributed to the breach, but the most significant is that the attackers had compromised credentials they were able to use to access PowerSource, the customer support portal for PowerSchool. From there, they were able to access customer data using the PowerSource remote support tools. It is unclear if Multifactor Authentication was turned on at the time; however, according to&nbsp;<a href="https://www.bleepingcomputer.com/news/security/powerschool-hack-exposes-student-teacher-data-from-k-12-districts/">BleepingComputer</a>, the attacker was located in Ukraine, but EdTech IRL also reported that MFA had been enabled as of January 7th. Most likely, MFA was turned on after the breach was discovered as a way to prevent further access by the attacker. PowerSchool has also done a full password reset and increased password length and complexity requirements.</p><p><br></p><p>What we know from these and other new sources is that the hacker used compromised credentials - basically a fancy way of saying a stolen username and password. How do hackers most commonly steal credentials? Phishing (that's another article for another time). The problem is, if the compromised PowerSchool employee reused the same credentials for other systems, those other systems are now also at risk. It's a safe bet too -&nbsp;<a href="https://docs.google.com/presentation/d/1vBgysMX8WfpDjYXYh7TJ-pyW3NCmpwcu1SNT9OdCP_E/edit#slide=id.g1f7e17628c0_0_1235">according to our friends at Bitwarden</a>, only 20% of employees report never reusing passwords. Since the password length and complexity requirements were also increased after the attack, they probably weren't long enough to begin with. If the hacker was in Ukraine, proper hardware-based or authenticator app-based MFA would have most likely stopped the attack in its tracks.</p><p><br></p><p><span style="font-weight:700;font-style:inherit;">What can I do?</span></p><p>There's a saying that a smart person learns from their own mistakes, but a wise person learns from other people's mistakes. Here is some wisdom we can glean from the PowerSchool breach:</p><ul><li style="font-weight:inherit;font-style:inherit;">STOP REUSING PASSWORDS. Use a unique password for every system.</li><li style="font-weight:inherit;font-style:inherit;">Passwords should be randomly generated and as long as the website will allow. Spring2025! isn't a secure password even though it meets most complexity requirements. RLA48$sjStb*5GQW5w%N is a 20-character password that I just generated from my password manager and can't be guessed. Which brings me to my next point.</li><li style="font-weight:inherit;font-style:inherit;">Use a password manager. We use&nbsp;<a href="https://bitwarden.com/pricing/">Bitwarden Enterprise</a>&nbsp;and provide it to our clients as part of our cybersecurity services, which includes a free license for Bitwarden Families, so our clients' employees and their families can have secure password practices at home. There are other great free and paid options too, but they only work if you use them.</li><li style="font-weight:inherit;font-style:inherit;">Turn on Multifactor Authentication for every application that has the option. Hardware security keys are the best and can eliminate the need for passwords with some systems. Authenticator apps are a close second. Only use text and email codes if no other option exists.</li></ul><p><br></p><p>If you don't have a cybersecurity system in place, or if you do and someone else is managing it but you'd like a second opinion, we offer a&nbsp;<span style="font-weight:inherit;font-style:inherit;"><a href="/contact" title="FREE Security Risk Assessment." rel="">FREE Security Risk Assessment.</a></span>&nbsp;This assessment will go over every area of your network to identify if and where you are vulnerable to an attack and propose solutions to fix it.</p><p><br></p><p><span style="font-weight:inherit;font-style:inherit;"><a href="/contact" title="Click here" rel="">Click here</a>&nbsp;to book your Security Risk Assessment with one of our cybersecurity experts, or call our office at 765-726-2849.</span></p></div>
<p></p></div></div><div data-element-id="elm_wwJcR3nRVtVOmesvPwCPZg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid " data-divider-border-color><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_avPv5GBzNNdK8p11daTbqg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_avPv5GBzNNdK8p11daTbqg"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_avPv5GBzNNdK8p11daTbqg"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Tue, 02 Sep 2025 08:01:00 -0400</pubDate></item></channel></rss>