Gentium Digital

Expert Advice When You Need it the Most

Cybercrime is still significantly underreported within the UK however it is estimated that 1 million cyber-dependant crimes were committed against UK households in the year ending August 2019 and has seen a 32% increase in the average cost to UK businesses for Cyber security breaches.

Each year UK households and businesses are becoming increasingly vulnerable to a Cyber attack with Cyber criminals seeking to exploit vulnerabilities either through human error or security vulnerabilities. Cyber criminals mainly seek to steal passwords, personal identifiable information (PII) and data to either facilitate other criminality, or to sell on the Darknet for other Cyber criminals to use.

Common Cyber threats or terms used to facilitate this are:


Where a criminal gains unauthorised access to a computer system.


Where a criminal sends an email making it appear to be from a legitimate source, however instead it contains a form of malicious software.


‘Malicious Software’ is designed to gain unauthorised access to computers with the intention of disrupting their normal function or to gather data from them.


‘Distributed Denial of Service’ where a criminal makes a website unavailable by overwhelming it with data traffic.

Cyber Crime as a Service (CaaS) is an emerging business where Cyber Criminals can sell their skills, knowledge and tools to other Cyber criminals for the purpose of conducting Cyber criminality.

One of the main problems faced by law enforcement when trying to detect Cyber criminality is the transnational nature of the internet and the anonymity it affords. The internet has made the world a very small place, meaning that a Cybercriminal could be attacking a victim in UK from the opposite side of the world.

This cross jurisdictional issue makes it increasingly difficult for Law enforcement in the UK to detect Cybercrime.

Due to this there is an increase and emphasis on raising awareness of Cybercrime and how UK households and businesses can prevent themselves of falling victim to a cyber-attack and how to protect themselves in the future.

Most Cyber threats can be easily prevented by using basic steps and having simple policies, controls and procedures in place to reduce the vulnerabilities.

Ransomware is a form of malware that enables Cybercriminals to remotely lock down files on a victim's computer. This means the victim cannot access the locked files on the computer, making them completely redundant. Once locked, the Cybercriminal will make contact with the victim and offer to unlock the files for a fee (ransom). Usually the Cybercriminal will install a time limit adding pressure on the victim to act. The ransom demand will commonly be for the victim to make a payment via a form of Cryptocurrency.

If you were a victim of a Ransomware attack tomorrow:

- Would you know what to do?
- Who would you report it to?
- Would you know how to make a Cryptocurrency payment?

We specialise in delivering training centred around Cryptocurrency. Our courses aim to provide attendees a greater understanding of Cryptocurrency and how it works.

We have unique practical demonstrations and hands on presentations to aid learning of this complex and technical subject.

Whether you are new to Cryptocurrency, have a vested interest or have a good understanding our training courses can be tailored to your needs, however our main objective is for attendees to gain a greater understanding in the following areas:

- Cryptocurrency – What it is and how it works
- Cryptocurrency as a form of International Money Laundering
- Cryptocurrency ATMs
- Cryptocurrency to pay Ransomware
- Cryptocurrency trace & track investigations
- Cryptocurrency UK and Global legislation and asset recovery
- Cryptocurrency - Recovery best practice guide

As part of the learning we will also provide attendees guidance on Cyber security and the simple measures that can be put in place to prevent falling victim to a Cyber-attack.

Get in touch

Early contact is recomended if you are subject to a digital attack on your systems.