Tax season is financial crime season

1 October 2018 Information Security, Security Services & Risk Management

Tax season in South Africa opened on 1 July – and to many it’s an opportunity to file tax returns for a welcome refund. However, to online scammers it’s a window of opportunity. Sensitive financial data is everywhere: taxes filed online, taxpayers accessing banking and investment information, and personal financial records sitting on hard drives.

Carey van Vlaanderen.
Carey van Vlaanderen.

The opportunity is irresistible to online thieves, so users who let their guard down during the rush to get their taxes done are susceptible to scam artists, says Carey van Vlaanderen, CEO at ESET Southern Africa.

Identity thieves often send fake emails purporting to be from SARS to trick victims into disclosing personal information. Your financial identity is yours and yours alone. The following are some steps you can take to keep the scammers at bay during financial crime season – and all year round.

1. Sweep your computer

Before you work on your taxes, work with financial data on your computer, or visit banking or financial sites, update your antivirus/antimalware software and run a scan. The little bit of extra time it takes is well worth it when you consider the consequences of keylogger or other malware grabbing your passwords, account numbers, or other personal data that could be used to steal your financial identity.

2. Use only a secure browser

Every bit of personal information is potentially useful to a crook. A banking site, shopping site, or any other site that trades in personal financial data should support secure, encrypted browsing. Any site that doesn’t simply isn’t worth the risk. For extra safety, look for security software that includes Banking and Payment Protection, which automatically opens a new, secure browser for you when you’re making financial transactions online.

3. Don’t give out any personal financial information

If you get an email from a bank, shopping site, or any other source that asks you to verify your password or enter personal information, don’t click on the link. Type the site’s URL into the address bar yourself and log in or use the phone to contact them. Deceptive emails and phony websites are easy for crooks to fake. Security software that protects against these phishing schemes add an extra layer of security should you ever let your guard down.

4. Log out of SARS e-filing or banking sessions

Leaving a session open while you do other work on your computer, take a phone call, or step away from your computer is an open invitation for crooks, and they don’t have to have control of your computer to hijack your session. Always close your browser completely after you’ve visited any site that requires a log-in or deals with your personal information.

5. Don’t do it from a hot spot

A public Wi-Fi hot spot is wide open for thieves who can steal information or plant malware on your computer. Never use them when you’re sending or working with your financial or other personal information. Be especially careful with your tax return – complete with your identity number, it’s a gold mine for identity thieves. If you use public hotspots at all, for any purpose, install security software that includes a firewall.

6. Consider encrypting the information that you store or send

Encryption software is simple to use and protects your sensitive personal information from prying eyes. Recipients of your emails can open them normally. If you store tax or financial records on your computer, store them in a folder with an innocuous or misleading name, and use a file encryption program to provide additional security in case your machine is compromised.

7. Protect mobile devices too

Your mobile device might contain financial information, emails with account updates from your bank, or links that allow a thief to access your bank account. If you haven’t done so already, lock your phone with a password, and invest in security software that protects it from malware and safeguards your information in case of loss or theft.

8. Update regularly

It’s standard advice, but it bears repeating: update regularly. Spyware and malware take advantage of vulnerabilities in software to gain a foothold, install, and spread silently. New vulnerabilities are discovered all the time, and your mission is to keep up with the patches before the criminals can exploit them. Make sure your operating system and all web browsers you use are up to date, and pay special attention to browser plug-ins.

By following these tips and combining a little extra vigilance with the right security software, you can protect your computing devices, your financial identity and livelihood.

For more information contact ESET-SA, +27 21 659 2000, info@eset.co.za, www.eset.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Banking’s AI reckoning
Commercial (Industry) Surveillance Access Control & Identity Management Fire & Safety Perimeter Security, Alarms & Intruder Detection Information Security Asset Management News & Events Integrated Solutions Infrastructure Security Services & Risk Management Education (Industry) Entertainment and Hospitality (Industry) Financial (Industry) Healthcare (Industry) Industrial (Industry) Mining (Industry) Residential Estate (Industry) Retail (Industry) Transport (Industry) Conferences & Events Products & Solutions Associations Videos Training & Education Smart Home Automation Agriculture (Industry) Logistics (Industry) AI & Data Analytics Facilities & Building Management IoT & Automation Power Management
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Eight African cybersecurity trends for 2026
Information Security
Check Point Software Technologies has released eight critical trends shaping Africa’s digital turning point in 2026, noting that their implementation will require the government, the private sector, and key civic institutions to cooperate.

Read more...
The year of the agent
Information Security AI & Data Analytics
The dominant attack patterns in Q4 2025 included system-prompt extraction attempts, subtle content-safety bypasses, and exploratory probing. Indirect attacks required fewer attempts than direct injections, making untrusted external sources a primary risk vector heading into 2026.

Read more...
AI cybersecurity predictions for 2026
AI & Data Analytics Information Security
The rapid development of AI is reshaping the cybersecurity landscape in 2026, for both individual users and businesses. Large language models (LLMs) are influencing defensive capabilities while simultaneously expanding opportunities for threat actors.

Read more...
SMARTpod Talks to Check Point Technologies about the African Perspectives on Cybersecurity report
SMART Security Solutions News & Events Information Security Videos
SMART Security Solutions spoke with Check Point's Hendrik de Bruin about the report, the risks African organisations face, and some mitigation measures.

Read more...
SA availability of immutable backup storage appliance
CASA Software Infrastructure Security Services & Risk Management
CASA Software has launched the newly released Nexsan VHR-Series, a fully integrated, enterprise-class, immutable backup storage appliance purpose-built for Veeam software environments, with usable capacity ranging from 64 TB to 3,3 PB.

Read more...
Beagle Watch named best security company in Johannesburg
News & Events Security Services & Risk Management
Beagle Watch Armed Response has been named Johannesburg’s Best Security Company in the 2025 Best of Joburg Awards, surpassing about 26 nominated private security firms in the greater Johannesburg region, thanks to overwhelming public support.

Read more...
Securing the smart fleet
Information Security Transport (Industry) Logistics (Industry) IoT & Automation
Contributing around 10 to 12% of South Africa’s GDP, the transport and logistics sector supports almost every part of the country’s economic activity. The stakes for keeping these systems secure are higher than ever before.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.