• May 8th, 2017

Are you GDPR Ready?

When the EU’s GDPR was announced, it was due to be enforced in the UK on 25 May 2018. Following last year’s ‘Brexit’ referendum the UK Government has confirmed that the...

- Read more
  • May 5th, 2017

Countdown to GDPR

TIME TO GDPRCountdown Despite Brexit, all UK business will need to demonstrate compliance with the GDPR, which becomes law in 12 months. But, what do you have to do, to...

- Read more
  • October 5th, 2016

Cyber Security review: A G-Cloud 8 service

Is your vital information protected against cyber threats? Cyber Security is now daily news, with both private and public sector organisations being targeted with increasing frequency. – How effective...

- Read more
  • September 25th, 2016

Introducing Vaporstream – Secure text messaging

PRIVACY SHOULD NOT BE A LUXURY As BYOD and COPE become standard practice in the workplace, use of standard SMS can pose a real security risk. So a messaging...

- Read more
  • September 4th, 2016

G-Cloud 8 Oyster IMS is an approved supplier

Oyster IMS: approved supplier on the G-Cloud 8 framework Oyster IMS is once again an approved supplier on the UK Government’s G-Cloud framework, now in its 8th iteration. The...

- Read more
  • June 8th, 2016

05 July: Exec Briefing on Information Governance

Join Oyster IMS in London on 05 July 2016, for a couple of cocktails and to hear how a leading Lloyd’s Managing Agent implemented a highly effective Information Governance programme, to bring their...

- Read more
  • April 6th, 2016

Oyster IMS win HPE GOLD

Oyster IMS are delighted to have been recognised by HPE as leaders in our field, with the award of a GOLD Partner accreditation for Information Governance.  This acknowledges Oyster...

- Read more
  • November 9th, 2015

ProSec2 – Information Security accreditation

OYSTER IMS introduces a new Information Security accreditation- Prosec2 Prosec2 is a new standard in information security, which significantly reduces the risk of data breach, using a practical process...

- Read more
  • August 5th, 2015

An Information Governance Approach to Cybersecurity Threats

Cybersecurity is typically focussed on preventing intrusion to networks. Firewalls, access controls, passwords biometrics and secure environments all pay their part. But the fact remains that tens of thousands...

- Read more
  • August 4th, 2015

04 Aug: Vacancy – Technical Analyst

We’re creating a new position at Oyster IMS. Would you like to join our team as a Technical Analyst? Take a look at the Vacancy Noticeand get in touch...

- Read more