DataMotion Blog

Get the latest trends, techniques, and best practices to help your organization be compliant with privacy and security regulations, while making data workflows more efficient by reading the latest blogs by DataMotion. Subscribe Now

Our blog features up-to-date research, articles, reports, and case studies on the secure data delivery market, information about upcoming networking events and webinars, as well as updates on our products and services. Choose a blog below to get started now.

Mail icons blurred above a browser search bar

Gmail TLS Email Encryption – is it good enough?

Gmail TLS Email Encryption – is it good enough? 1024 403 Alex Mushkin

Major cloud email services such as Gmail and Yahoo Mail announced their use of TLS about two years ago (TLS is transport layer security – a type of encryption that can be applied to email transmissions). Both services announced they…

read more
Purple browser windows with white mail icons above them

Is TLS email encryption good enough?

Is TLS email encryption good enough? 1024 403 Alex Mushkin

As most people are aware, the need for secure messaging, email encryption or email compliance is on the mind (or should be) of almost all managers inside every business. The need for TLS (Transport Layer Security) can vary from avoiding…

read more
Blue globe, keyboard and numbers

Achieve Office 365 CJIS Compliance

Achieve Office 365 CJIS Compliance 1024 403 Christian Grunkemeyer

Moving from an on-premises Exchange server to Microsoft Office 365 (O365) can have numerous benefits. Microsoft promotes its cloud productivity suite to yield better collaboration, increased productivity and a reduced cost of ownership.  Many state and local government agencies eager…

read more
Browser bar with a mouse click next to it

How safe are HTTPS connections? Not as safe as you think.

How safe are HTTPS connections? Not as safe as you think. 1024 403 Alex Mushkin

While using the internet, there’s a chance that you’ve noticed some websites using HTTP connections while others use HTTPS ones. The major difference between these is that HTTPS connections are considered “secure” while HTTP ones are not. This begs the…

read more
White lock icon with a mouse click in the middle in front of a red and orange background

Opportunistic TLS – Two Good Ways to Put Your Email at Risk

Opportunistic TLS – Two Good Ways to Put Your Email at Risk 1024 403 Bob Janacek

Email encryption allows organizations to protect sensitive messages and increase their compliance with privacy regulations.  One common encryption method, known as opportunistic TLS, automatically tries to secure the path that messages take when they travel to recipient email systems.  Since…

read more
Person in white shirt working on a tablet with white mail icons floating above it

Best Practices: HIPAA Email Compliance – Patient Records

Best Practices: HIPAA Email Compliance – Patient Records 1024 403 Hugh Gilenson

With new HIPAA regulations, patients can have even more access to their medical records. With many patients wanting to receive their information by email, does your organization know the best practices for emailing patient records in compliance with HIPAA? In…

read more
Hands holding graphic of two white clouds with a lock symbol

Salesforce Service Cloud and HIPAA Compliance

Salesforce Service Cloud and HIPAA Compliance 1024 403 Hugh Gilenson

Q: My company sells to the healthcare industry. Is it a HIPAA violation when my Customer Service Rep replies to a support ticket on Service Cloud? I mean, Salesforce is HIPAA compliant, right? A: You very well may be in…

read more
Inside of a data center

Best Practices: Securing Data at Rest, in Use, and in Motion

Best Practices: Securing Data at Rest, in Use, and in Motion 1024 403 Bud Walder

Sensitive business data is more vulnerable today than ever before. Corporate trade secrets, national security information, personal medical records, Social Security and credit card numbers are all stored, used, and transmitted online and through connected devices. This proliferation of valuable…

read more
Hand held out beneath white mail icons

Major Email Compliance Regulations That You Need to Know

Major Email Compliance Regulations That You Need to Know 1024 403 Bob Janacek

Keeping up with industry and government email compliance regulations impacting the exchange of sensitive information can be exhausting. So, we’ve put together a list of four big ones you need to know about. Payment Card Industry Data Security Standard (PCI…

read more
Doctor holding phone with an icon of a doctor on it

What Exactly is a HISP?

What Exactly is a HISP? 1024 403 Hugh Gilenson

The term “HISP” is often used when discussing Direct Secure Messaging, but what exactly is a HISP? A Health Information Service Provider, or HISP, is an accredited network service operator that enables nationwide clinical data exchange using Direct Secure Messaging (aka Direct, Direct Messaging…

read more
Doctor typing on a laptop

Direct Secure Messaging

Direct Secure Messaging 1024 403 Hugh Gilenson

If you work in the healthcare industry, then you may have heard the terms “Direct” or “Direct Secure Messaging” several times. Whether you consider yourself to know everything about the subject or you are just starting to get familiar with…

read more