Your immediate response to prevent banking fraud

Issue 7 2021 Editor's Choice

If you are like any normal South African, you approach intersections labelled ‘high crime’ or ‘high smash and grab zone’ with an overabundance of caution and the same applies to any intersection where there are a lot of people loitering around your vehicle. The last thing you want is to become a victim of a crime of opportunity.

Close to 41% of the South African population has a smartphone. With government encouraging the public to practice social distancing, online banking platforms have become extremely popular. Criminals are aware of this and reports from the South African Police Service point out that when it comes to crimes of opportunity (i.e. smash and grab) criminals press their victims for their online banking password before making off with the phone.

“This creates a situation where members of the public are increasingly becoming victims of identity fraud. So, what happens when your phone is stolen? Who must your report it to once you have reported it to the police?” asks Manie van Schalkwyk, CEO of the Southern African Fraud Prevention Service (SAFPS).

Contact your bank

The SAFPS approached a number of banks with this question and the simple answer is that victims of these crimes should contact their banks as soon as possible.

The device needs to be delinked from the banking profile as soon as possible. The victim of the crime needs to ‘break the handshake’. This is critically important. The next step is to change their password or sure phrase - the phrase that allows you to access your account. Clients should then consider adding an extra layer of encryption to their account making fraud less likely.

Another bank adds that victims of these crimes should block the actual bank account that the stolen phone accesses as well as the profiles related to this account. Once the account is secured, the victim should notify the cellphone service provider to block the SIM and the IMEI of the stolen device.

“There are a number of other steps that the public can take,” says Van Schalkwyk. “Be aware of your surroundings. If you are sitting in an outdoor café or restaurant know that if your phone gets stolen, the thief can make an easy get-away. Try to use your phone discreetly. In addition, be very wary of public Wi-Fi networks as they are unsecured. Finally, once you have reported the stolen device to the relevant authorities, contact the SAFPS.”

Taking the above action is critical in preventing identity fraud, which is a common crime in South Africa. However, criminals act quickly. The SAFPS can offer key assistance to victims of these crimes as one of the key services that it offers is protection against identity fraud.

Protective Registration

One of the most important services and the core of SAFPS’ service offering, is Protective Registration. Protective Registration is a free service protecting individuals against future identity fraud. Consumers apply for this service and the SAFPS alerts its members to take additional care when dealing with that individual’s details.

Protective Registration provides an added layer of protection and peace of mind regardless of whether the identity of the applicant has been compromised.

“If a member of the public wants to become proactive in the fight against fraud, the SAFPS is there to serve them. Visit our website on www.safps.org.za. Click on the fraud prevention tab and protect yourself against identity theft with Protective Registration. For best results, use your smartphone to go to its website. Once you have uploaded key pieces of information, you will add another layer of protection against potential ID fraud,” says Van Schalkwyk.

Victim Fraud Registration

Through Fraud Victim Registration, the SAFPS will assist applicants in preventing fraud that is a result of identity theft and impersonation.

This will protect applicants from associated financial implications. The SAFPS will issue applicants with a Victim of Impersonation Letter which they can share with future credit providers to assist in any verification processes.

Consumers are urged to visit the SAFPS website on www.safps.org.za and click on protect your identity. It is recommended that a smartphone is used in this process and that the applicant has a copy of their ID with them. Alternatively, applicants can follow the manual process explained on the website.

Go to www.safps.org.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...
Proactive estate security in Cape Town
neaMetrics OneSpace Technologies Technews Publishing SMART Security Solutions Fang Fences & Guards ATG Digital Editor's Choice News & Events Integrated Solutions Infrastructure Residential Estate (Industry)
SMART Security Solutions started the year with our annual SMART Estate Security Conference in Cape Town on 26 February 2026. Held at Anna Beulah Farm, the conference saw a number of delegates enjoying the farm’s excellent cuisine, while listening to outstanding presenters.

Read more...
How AI video is reshaping real estate security
neaMetrics TRASSIR - neaMetrics Distribution Editor's Choice
Globally, property maintenance and facility operations spending is projected to grow to over US$145 billion by 2034, reflecting rising complexity, compliance pressures, and increased exposure to operational costs. AI systems can protect properties, automate access, and optimise building management.

Read more...
Open systems support hybrid surveillance
SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice
Today, end users can select the most suitable surveillance solution for their needs, whether it is on-site, at the edge, or in the cloud; a hybrid approach combining different options is most effective depending on the scenario.

Read more...
Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.