Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      How AI agents are reshaping banking in South Africa - Lindelani Ramukumba, Absa

      How agentic AI is reshaping banking in South Africa

      5 April 2026
      South Africa's 5G boom is bypassing rural areas: Icasa

      South Africa’s 5G boom is bypassing rural areas: Icasa

      5 April 2026
      WhatsApp is eating South African operators' revenue

      WhatsApp is eating South African operators’ revenue

      4 April 2026
      DeepSeek V4 to run on Huawei silicon as China builds its own AI stack

      DeepSeek V4 to run on Huawei silicon as China builds its own AI stack

      4 April 2026
      Gaping holes in South African government cyber defences

      Gaping holes in South African government cyber defences

      2 April 2026
    • World
      Amazon in talks to buy satellite operator Globalstar

      Amazon in talks to buy satellite operator Globalstar

      2 April 2026

      Apple plans to open Siri to rival AI services

      27 March 2026
      It's official: ads are coming to ChatGPT

      It’s official: ads are coming to ChatGPT

      23 March 2026
      Mystery Chinese AI model revealed to be Xiaomi's

      Mystery Chinese AI model revealed to be Xiaomi’s

      19 March 2026
      A mystery AI model has developers buzzing

      A mystery AI model has developers buzzing

      18 March 2026
    • In-depth
      The biggest untapped EV market on Earth is hiding in plain sight

      The biggest untapped EV market on Earth is hiding in plain sight

      1 April 2026
      The R18-billion tech giant hiding in plain sight - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
    • TCS
      TCS | MTN's Divysh Joshi on the strategy behind Pi - Divyesh Joshi

      TCS | MTN’s Divyesh Joshi on the strategy behind Pi

      1 April 2026
      Anoosh Rooplal

      TCS | Anoosh Rooplal on the Post Office’s last stand

      27 March 2026
      Meet the CIO | HealthBridge CTO Anton Fatti on the future of digital health

      Meet the CIO | Healthbridge CTO Anton Fatti on the future of digital health

      23 March 2026
      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses - Clare Loveridge and Jason Oehley

      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses

      19 March 2026
      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience - Theo van Zyl

      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience

      13 March 2026
    • Opinion
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » Combating financial crime – Covid-19’s financial fallout

    Combating financial crime – Covid-19’s financial fallout

    By Alison Job8 July 2021
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    The financial impact of the Covid-19 pandemic will likely put enormous pressure on organisations’ financial results, while also presenting potential challenges for individuals. In these uncertain times, and with no clear end to the pandemic, criminals will be all too eager to exploit the current situation.

    Jaco van der Merwe, capability architect at Ovations Group, says: “Since the nationwide lockdown came into effect on 26 March 2020, the majority of the country’s workforce has been working remotely.”

    This, in itself, introduced several challenges, ranging from, but not limited to:

    • Potential disruption to business operations and business continuity;
    • Threats to information security;
    • Potential rise in financial crimes;
    • Threats to confidentiality to basic communication; and
    • Impact on customer experience.

    Van der Merwe says that as much as the pandemic has highlighted strengths and weaknesses in humanity, bringing out the best in people wanting to assist others, it has also brought to the fore opportunities for others to commit crime.

    The interesting thing is that Covid-19 has resulted in a reduction in many types of crime around the world. A report by USA Today on 4 April 2020 detailed a drop in criminal incidents (in the US) since 15 March of that year in 19 of 20 police agencies examined. However, the report also noted an increase in domestic violence.

    Phishing sites and phishing attacks have exploded since the outbreak of the coronavirus

    Closer to home, police minister Bheki Cele confirmed a decrease in cases of murder, rape, assault with intention to inflict grievous bodily harm and what he referred to as trio crimes — car hijackings, house robberies and business robberies.

    In contrast, cybercrime has surged — ConsumerFraudReporting.org published an article detailing the top 10 scams that consumers should be aware of:

    1. Debt collection
    2. Fake government officials
    3. Identity theft, phishing and pharming
    4. Phone scams
    5. Loan scams / credit fixers
    6. Fake prizes, free gifts and lottery scams
    7. Internet merchandise scams
    8. Car-related complaints
    9. Credit bureau and related credit scams
    10. Phishing/spoofing e-mails.

    Van der Merwe says there are two main approaches cybercriminals are taking to exploit the Covid-19 pandemic. But what can be done to protect individuals and organisations against this onslaught?

    “Phishing sites and phishing attacks have exploded since the outbreak of the coronavirus. There’s been a massive increase in the registration of websites relating to the coronavirus. The World Health Organisation issued a statement regarding scammers disguising themselves as the health authority, while many other information and cybersecurity experts have also advised that users must take particular care when dealing with communications and information relating to the virus.”

    Phishing epidemic

    “They further advised that demand for information about Covid-19 was creating the ideal situation for phishing attacks, with scamsters offering everything from fake cures to appeals to people’s charitable instincts. This type of scam is not new; it’s just the subject matter that’s changed, so it’s vital that employees and users are educated in how to avoid phishing e-mails.”

    Cybercriminals are also on the lookout for vulnerabilities within organisations’ systems. “With a large part of the workforce working remotely, many organisations had to rush to find remote working solutions to support and facilitate their ongoing operations. This could potentially result in vulnerabilities and weaknesses within systems, controls and products for cybercriminals to exploit.”

    Although many organisations have anti-money laundering (AML) and anti-fraud systems in place, depending on the business’s size and systems, many AML and compliance programmes rely on manual processes. They might even lack the technical resources to adapt business practices to support this new way of working. These limitations can hinder critical investigative workflows, risk assessments and reporting of potentially fraudulent or suspicious behaviour and transactions.

    Jaco van der Merwe

    In addition, when working remotely, financial crime management teams may have difficulty securely connecting to core banking and investigative systems or navigating multiple applications supporting their daily operations. Employees may also need to travel to the office if they are limited by manual investigation tools or lack adequate means to perform required compliance functions or file regulatory reports.

    While remote working can potentially impact operational efficiencies and productivity for the business, it can also lead to several challenges for employees. They have to adapt to a new way of working while trying to juggle health and safety concerns and family responsibilities. All of this can place added stress on employees and the emotional toll cannot be understated or overlooked.

    Van der Merwe recommends that organisations put policies, processes and procedures in place to minimise the impact of the Covid-19 pandemic and to ensure business continuity. Industry agencies are urging institutions to remain alert and vigilant in monitoring for rising fraud schemes and report potentially suspicious activity capitalising on consumer fear surrounding Covid-19.

    The pandemic has also led to a change in consumer behaviour and this, by default, also introduces new challenges

    The pandemic has also led to a change in consumer behaviour and this, by default, also introduces new challenges. For instance, many consumers are asking their banks to increase their daily transaction limits to meet increased demand for additional cash, card purchases and transfers. As organisations strive to support customers, financial crime management programmes are necessary to monitor for illicit activity.

    Challenging

    Also, change in consumer behaviour can potentially increase the number of false-positive alerts for anti-money laundering compliance professionals to review. Risk management and compliance programmes with limited resources may find it challenging to manage the added workload that false positives can create, while ensuring effective monitoring and reporting of suspicious activity.

    Van der Merwe concludes: “Organisations need to think about using everything at their disposal to future-proof their practices and create an ability to respond very quickly, accurately and defensibly to the changing regulatory landscape and to have confidence in the people they do business with.”

    For more, visit ovationsgroup.com, or find the company on Facebook, LinkedIn, Twitter and Instagram.

    • This promoted content was paid for by the party concerned
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    Jaco van der Merwe Ovations Ovations Group
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleHybrid cloud and multi-cloud – is there a difference, and does it matter?
    Next Article South Africa’s MeerKAT discovers treasure trove of galaxies

    Related Posts

    Service is everyone's problem now - and that's exactly why the Atlassian Service Collection matters

    Service is everyone’s problem now – why the Atlassian Service Collection matters

    20 February 2026
    Scaling enterprise productivity with AI - a must-attend event for business leaders

    Scaling enterprise productivity with AI – a must-attend event for business leaders

    21 May 2025

    Brunch & Learn: unleash the power of IBM AI – watsonx and IBM OpenPages

    4 October 2024
    Company News
    Synthesis helps financial enterprises transform with new Gemini Enterprise - Digicloud Africa

    Synthesis helps financial enterprises transform with new Gemini Enterprise

    2 April 2026
    The next churn wave is already in your contact centre conversations - CallMiner

    The next churn wave is already in your contact centre conversations

    2 April 2026
    Mining's problem isn't output, it's execution - Workday

    Mining’s problem isn’t output, it’s execution – Workday

    1 April 2026
    Opinion
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    How AI agents are reshaping banking in South Africa - Lindelani Ramukumba, Absa

    How agentic AI is reshaping banking in South Africa

    5 April 2026
    South Africa's 5G boom is bypassing rural areas: Icasa

    South Africa’s 5G boom is bypassing rural areas: Icasa

    5 April 2026
    WhatsApp is eating South African operators' revenue

    WhatsApp is eating South African operators’ revenue

    4 April 2026
    DeepSeek V4 to run on Huawei silicon as China builds its own AI stack

    DeepSeek V4 to run on Huawei silicon as China builds its own AI stack

    4 April 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}