Passport to identity crisis

September 2015 Editor's Choice, Access Control & Identity Management, Information Security, News & Events

Scores of South Africans woke up to a disturbing reality recently when the British High Commission contacted them to say that their UK Visa Applications, together with all supporting documentation, had been stolen when the courier van transporting these documents to the airport was hijacked.

While these people must deal with the inconvenience of applying for new passports, there’s a far more sinister issue at play. When applying for a visa, people are required to include original copies of their most personal documentation. From marriage certificates to bank statements and even their home addresses. In the wrong hands this type of information could create chaos for those people affected.

Identity theft is one of the fastest growing crimes in the world today, one that has given rise to hundreds of criminal syndicates who know exactly how to use your own personal information for their financial gain. This could include hacking into your bank accounts, running up thousands of rand in credit to your name, selling your identity to others, even faking your marriage to an illegal foreigner – and all this combined with access to your home address.

While it’s unclear whether these hijackers were specifically targeting the High Commission’s documents or were aware of other high value items in the vehicle, but forewarned is forearmed and there are some proactive steps people can take to protect themselves in this case:

• Monitor your personal information like a hawk, keeping a close eye on all banking and card activity.

• File a police report and notify your banks to the fact that your identity has been compromised.

• Close any and all accounts that you believe have been tampered with, and change all of your passwords immediately.

• Place a fraud alert with your creditors.

• Notify Home Affairs about your missing passport.

• Finally, take ownership of your identity. ThisIsMe has launched a service that enables you register on its system, which is directly linked to the Department of Home Affairs National Identification system (HANIS).

• In future banks, financial services providers and identity verification agencies can accurately and positively identify you as a prospective client if you are registered on this system.

Identity theft has unfortunately become a terrifying reality and it can take years to repair your financial reputation should your information somehow land in the wrong hands. Don’t hesitate to take those proactive steps to protect yourself against this type of crime. It’s never too late to take control of the situation.

For more information contact ifacts, jenny@ifacts.co.za or www.ifacts.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
Protecting high-value data from AI
CASA Software Infrastructure Information Security Products & Solutions
As artificial intelligence accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent.

Read more...
Reshaping South Africa’s built environment
Securex South Africa Facilities & Building Management News & Events Commercial (Industry)
FM teams are responsible for the overall operational environment of a building, while security teams focus on protection, control, and incident response. Increasingly, both rely on the same data streams, infrastructure, and digital tools.

Read more...
Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...
Factories, grids, and finance: Critical infrastructure cyber lessons of 2025
Asset Management Information Security Industrial (Industry)
Africa has seen an accelerated, large-scale digitisation of our overall industrial base, and this rapid convergence of IT and OT is happening on a foundation that, in essence, was not designed to be cybersecure.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.