DataMotion Blog

Get the latest trends, techniques, and best practices to help your organization be compliant with privacy and security regulations, while making data workflows more efficient by reading the latest blogs by DataMotion. Subscribe Now

Our blog features up-to-date research, articles, reports, and case studies on the secure data delivery market, information about upcoming networking events and webinars, as well as updates on our products and services. Choose a blog below to get started now.

Man putting on glasses in front of a laptop with a travel coffee cup next to it

The DataMotion September Hot List

The DataMotion September Hot List 736 313 Team DataMotion

Welcome to another edition of the DataMotion Hot List! Our monthly hot lists give you a quick recap of the month’s content, updates, news, and more. September was a busy month for the DataMotion Blog, where we published the third…

read more
Developer staring at a monitor with two windows of code open side by side

4 Tips for Becoming a Postman Guru

4 Tips for Becoming a Postman Guru 736 313 Team DataMotion

In my experience, an API is to a developer is what peanut butter is to chocolate and sunshine is to baseball games: almost a necessity. Utilizing APIs allows developers to incorporate code they didn’t have to develop themselves. This code…

read more
Patient signing insurance claim form next to doctor

The Great Return to the Trade Show: InsureTech Connect 2021

The Great Return to the Trade Show: InsureTech Connect 2021 736 313 Christian Grunkemeyer

InsureTech Connect will mark my first in-person trade show since the onset of the pandemic. I miss the in-person human interaction and hearing people’s stories! There are so many emotions around this – I’m nervous, excited, and truly curious about…

read more
Programmer working on developing software with two laptops, a monitor, a keyboard, and a track pad

5 Things to Consider Before Developing Software In-house

5 Things to Consider Before Developing Software In-house 736 313 Team DataMotion

It’s a common analogy: the decision between building or buying a software application is comparable to choosing whether to build or buy a house. The pros and cons for both are similar. Building it yourself often leads to something made…

read more
Hacker using laptop surrounded by falling dollar bills on a blue background

The Rise of RaaS: The Real Cost of a Ransomware Attack

The Rise of RaaS: The Real Cost of a Ransomware Attack 736 310 Team DataMotion

Welcome to the DataMotion Blog’s third and final installment to the Rise of Ransomware as a Service series. Thus far, we have focused on what Ransomware as a Service is, examined some recent attacks and how they started, and explored…

read more
Image of smartphone resting on a laptop with a calendar and pencil sitting to the right

The DataMotion August Hot List

The DataMotion August Hot List 736 310 Team DataMotion

Greetings, readers, and welcome to the DataMotion Hot List, where we recap the month’s news, updates, and content. This month, we delivered the final installment of the Danger for Data Series, shared 14 points of consideration when vetting an API…

read more
Stethoscope on top of clipboard while a doctor and a patient communicate in the background

HIMSS 2021 Takeaways: Healthcare, Cybersecurity and Interoperability

HIMSS 2021 Takeaways: Healthcare, Cybersecurity and Interoperability 736 310 Doug Rubino

Team DataMotion recently attended the 2021 HIMSS (Health Information Management Systems Society) conference in Las Vegas, Nevada, August 9th-13th. While we did not host a booth this year, some of our team represented our company as attendees, and we wanted…

read more
Screens showing systems protected after a hacker's ransomware attack is denied

Rise of RaaS: Consolidating the Vendor Risk Factor

Rise of RaaS: Consolidating the Vendor Risk Factor 736 310 Team DataMotion

In the first part of our Rise of Ransomware as a Service series, we learned RaaS enables organizations to purchase ransomware and gain hacking resources which were not accessible before. With heightened access to malicious software, a rise in ransom attacks…

read more
Hacker in mask reach hand out to steal data superimposed on screen

The Rise of Ransomware as a Service

The Rise of Ransomware as a Service 1024 432 Team DataMotion

From the attacks on SolarWinds to the JPS Meat Packing Company, the threat of a cyberattack has been democratized. Enterprises both large and small, across industries, have reported attacks and ensuing business disruptions, financial losses, and damaged reputations. In this…

read more
Blue pixelated checkmark on a dark blue pixelated background

Choosing an API Company: 14 Points for Due Diligence

Choosing an API Company: 14 Points for Due Diligence 736 310 Alex Mushkin

Technical depth. Benefits. Security. These are a few things that you will have on a checklist when choosing an API company. As we mentioned in part three of the Danger for Data series, taking time for due diligence is essential…

read more
Four blue closed padlock and one white open padlock symbols on dark grey alphanumeric code pixelated background.

Danger for Data, Part Three: Remedies for Risk

Danger for Data, Part Three: Remedies for Risk 736 310 Bob Janacek

My two previous DataMotion Blog articles covered the risks of a data breach and where they live in an organization, focusing on both the IT side and the business side. As was mentioned, it is not a question of if…

read more
Person typing on laptop with credit card in hand. A security lock is superimposed in blue

Streamlined, Smart, Self-Service Purchasing for Transactional APIs

Streamlined, Smart, Self-Service Purchasing for Transactional APIs 736 310 Team DataMotion

At the end of 2020, we announced changes to the way our customers can learn about, trial, and buy DataMotion services. We introduced our customer self-service center, the first of a series of transactional APIs, and the DataMotion mobile app.…

read more
Person typing on laptop while checking calendar

The DataMotion Hot List

The DataMotion Hot List 736 310 Team DataMotion

Greetings, readers! We hope that this inaugural “Hot List” round-up post finds you well and at the end of a productive week. The DataMotion Blog has recently hosted a variety of thought leadership topics, including an in-depth look at the…

read more
Hand touching laptop with blue data points on screen

Danger for Data, Part Two: Seven Pain Points in Your Processes

Danger for Data, Part Two: Seven Pain Points in Your Processes 786 310 Bob Janacek

As the old saying goes, there are two certainties in life: death and taxes. And if your organization deals with exchanging sensitive information, you can add data breach to that list. Data breaches occur at an alarming rate, their causes…

read more
A light blue security lock with data pixels flying to the right side on a dark blue background

Danger for Data, Part One: Five Back-End Breach Risk Factors

Danger for Data, Part One: Five Back-End Breach Risk Factors 786 310 Bob Janacek

In 2020 alone, Risk Based Security recorded over 3,900 data breaches worldwide. A considerable number, yes, but 48% lower than in 2019. Don’t start celebrating just yet–the report also found that 37 billion records were exposed in 2020, an increase…

read more
A light blue heart superimposed on a dark blue background with data points and health information technology icons surrounding the heart

Directly Speaking: The 2021 DirectTrust™ Summit

Directly Speaking: The 2021 DirectTrust™ Summit 786 310 Doug Rubino

On June 9th-10th, DataMotion participated in the DirectTrust™ Summit, which hosted attendees and distinguished guest speakers from the healthcare industry. Below is an interview with Doug Rubino, DataMotion Business Development Director, Healthcare, who attended the Summit and kindly shared a…

read more
Blue lock in shield surrounded by a blue circle and data points

DataMotion: A Zero Trust Model You Can Trust

DataMotion: A Zero Trust Model You Can Trust 786 310 Bob Janacek

It’s a safe bet to say that your organization is concerned about cybersecurity. Your IT team is likely well-staffed and has implemented the latest security tools, and trained non-IT staff on the ills that befall those who click on external…

read more
Doctor with stethoscope typing on a smartphone

What’s Happening Next Week? DataMotion is at the 2021 DirectTrust™ Summit

What’s Happening Next Week? DataMotion is at the 2021 DirectTrust™ Summit 736 310 Team DataMotion

On June 9th and 10th (Wednesday and Thursday) DataMotion will be participating in the virtual 2021 DirectTrust Summit.  This year’s Summit features an awesome line-up of health IT and interoperability authorities from around the country, and as always, this event…

read more
Image of a man using a secure app on a mobile device

Scanning and Secure Sending in Motion: Presenting the DataMotion App

Scanning and Secure Sending in Motion: Presenting the DataMotion App 786 310 Team DataMotion

Today’s workplace can closely resemble the lyrics from Johnny Cash’s hit song, “I’ve Been Everywhere.” Whether you are logging in from the beach or the mountains, or simply commuting via hallway to living room, the modern “office” has most definitely…

read more
Blue rocket ship flying through space surrounded by blue planets and stars

Exploring DataMotion in 2021: What’s New and What’s to Come

Exploring DataMotion in 2021: What’s New and What’s to Come 786 310 Bob Janacek

We blasted into 2021 with some pretty significant changes to our products and the overall way that customers and prospects experience DataMotion. To recap, we made it even easier to learn about, try, and buy our APIs and pre-built solutions.…

read more