Get the latest trends, techniques, and best practices to help your organization be compliant with privacy and security regulations, while making data workflows more efficient by reading the latest blogs by DataMotion. Our blog features up-to-date research, articles, reports, and case studies on the secure data delivery market, information about upcoming networking events and webinars, as well as updates on our products and services. Choose a blog below to get started now.

What are Open APIs and FHIR for Health Information?

What are Open APIs and FHIR for Health Information? 1024 403 Hugh Gilenson

In clinical healthcare, the use of Open APIs is a relatively new form of secure data sharing in clinical healthcare. API, which stands for Application Programming Interface, allows the health care provider to expose data on the web so correspondents…

read more

Is Encryption Enough to Protect Yourself?

Is Encryption Enough to Protect Yourself? 1024 403 Bob Janacek

With the increase in cybercrime over the past few years, many internet users have turned to encryption in an effort to protect themselves online. Businesses are no exclusion; well-known companies have experienced data breaches within the same time frame and…

read more

Gmail TLS Email Encryption – is it good enough?

Gmail TLS Email Encryption – is it good enough? 1024 403 Alex Mushkin

Major cloud email services such as Gmail and Yahoo Mail announced their use of TLS about two years ago (TLS is transport layer security – a type of encryption that can be applied to email transmissions). Both services announced they…

read more

Is TLS email encryption good enough?

Is TLS email encryption good enough? 1024 403 Alex Mushkin

As most people are aware, the need for secure messaging, email encryption or email compliance is on the mind (or should be) of almost all managers inside every business. The need for TLS (Transport Layer Security) can vary from avoiding…

read more

Achieve Office 365 CJIS Compliance

Achieve Office 365 CJIS Compliance 1024 403 Christian Grunkemeyer

Moving from an on-premises Exchange server to Microsoft Office 365 (O365) can have numerous benefits. Microsoft promotes its cloud productivity suite to yield better collaboration, increased productivity and a reduced cost of ownership.  Many state and local government agencies eager…

read more

How safe are HTTPS connections? Not as safe as you think.

How safe are HTTPS connections? Not as safe as you think. 1024 403 Alex Mushkin

While using the internet, there’s a chance that you’ve noticed some websites using HTTP connections while others use HTTPS ones. The major difference between these is that HTTPS connections are considered “secure” while HTTP ones are not. This begs the…

read more

Opportunistic TLS – Two Good Ways to Put Your Email at Risk

Opportunistic TLS – Two Good Ways to Put Your Email at Risk 1024 403 Bob Janacek

Email encryption allows organizations to protect sensitive messages and increase their compliance with privacy regulations.  One common encryption method, known as opportunistic TLS, automatically tries to secure the path that messages take when they travel to recipient email systems.  Since…

read more

Best Practices: HIPAA Email Compliance – Patient Records

Best Practices: HIPAA Email Compliance – Patient Records 1024 403 Hugh Gilenson

With new HIPAA regulations, patients can have even more access to their medical records. With many patients wanting to receive their information by email, does your organization know the best practices for emailing patient records in compliance with HIPAA? In…

read more

Salesforce Service Cloud and HIPAA Compliance

Salesforce Service Cloud and HIPAA Compliance 1024 403 Hugh Gilenson

Q: My company sells ot the healthcare industry. Is it a HIPAA violation when my Customer Service Rep replies to a support ticket on Service Cloud? I mean, Salesforce is HIPAA compliant, right? A: You very well may be in…

read more

Best Practices: Securing Data at Rest, in Use, and in Motion

Best Practices: Securing Data at Rest, in Use, and in Motion 1024 403 Bud Walder

Sensitive business data is more vulnerable today than ever before. Corporate trade secrets, national security information, personal medical records, Social Security and credit card numbers are all stored, used, and transmitted online and through connected devices. This proliferation of valuable…

read more

Major Email Compliance Regulations That You Need to Know

Major Email Compliance Regulations That You Need to Know 1024 403 Bob Janacek

Keeping up with industry and government email compliance regulations impacting the exchange of sensitive information can be exhausting. So, we’ve put together a list of four big ones you need to know about. Payment Card Industry Data Security Standard (PCI…

read more

What Exactly is a HISP?

What Exactly is a HISP? 1024 403 Hugh Gilenson

The term “HISP” is often used when discussing Direct Secure Messaging, but what exactly is a HISP? A Health Information Service Provider, or HISP, is an accredited network service operator that enables nationwide clinical data exchange using Direct Secure Messaging (aka Direct, Direct Messaging…

read more

Direct Secure Messaging

Direct Secure Messaging 1024 403 Hugh Gilenson

If you work in the healthcare industry, then you may have heard the terms “Direct” or “Direct Secure Messaging” several times. Whether you consider yourself to know everything about the subject or you are just starting to get familiar with…

read more
[contact-form-7 404 "Not Found"]
[contact-form-7 404 "Not Found"]