• FICA Compliance Services

    View our FICA Compliance Services

    Compliance, consulting and training options for accountable institutions to implement anti-money laundering procedures and meeting the requirements of the Financial Intelligence Centre Act (FICA).

Download our Moonstone Compliance and Risk Management Services Brochure


Our Compliance
& Risk Management

We are the largest independent provider of compliance and regulatory risk management services to financial services businesses in South Africa.

With over 50 experienced Compliance Officers and Consultants country wide, we can provide our services at your office wherever you are located, irrespective of whether you are a small business or a national organisation with numerous branches.

How Will Your Company
Benefit from Our Services?


Experienced compliance


Operationalising Compliance


Access to
help desk


Industry &
legislation updates


Licensing and


Webinars & Events

Your Regulatory Specialists

We specialise in regulatory compliance and licensing solutions for the financial services and credit industry.

What we can help you with

Formal compliance monitoring

Regular reporting

Trends and management information

Compliance consultation

Development of bespoke risk management plans

Comprehensive information notifications

Customised Training sessions and workshops

Our Services Include


Safeguarding your organisation and improving stakeholder relations by providing professional guidance and expert advice on the navigation of the ever-changing regulatory landscape.


Continuous process of gathering information to identify risk and measuring adherence to best practice benchmarks. Thus, proactively preventing contraventions.


Providing a detailed representation and description of compliance activities within your organisation – through regular updates, feedback reports and completion of statutory returns.

Keeping You

Keeping you up to date on industry, compliance and legislative developments as well as market commentary through our weekly newsletters, events and various other communication initiatives.

Latest Employment Law News

August 07, 2023

Affirmative action is a way of making the workplace more representative and fair. It connects qualified people from designated groups with equal opportunities in the workplace. Affirmative action falls under the EEA and must be linked with your EEPlan to be lawful.

Read More

August 07, 2023

Quotas are prohibited by our Constitution, as it echoes the unlawful practices that took place during Apartheid. For example, a company places a moratorium on hiring any white candidates for the duration of its current EE plan. You know you are dealing with a quota, if the company is completely inflexible in how it implements its numerical goals/targets and places an absolute barrier on employment practices affecting a specific group of applicants.

Read More

August 07, 2023

The numerical goals are a designated employer's projection of what it aims to achieve at the end of its current employment equity plan regarding its entire workforce.

Numerical targets are a designated employer's projection of what it aims to achieve at the end of its current reporting period (annually).

Read More

August 07, 2023

You know you are dealing with misconduct, if the person has shown you, they can follow the rule, but they are choosing not to. Proof of this is, they have successfully completed this exact job, before.

You know you are dealing with incapacity, if the person wants to follow the rule, but for some reason they cant. Proof of this is, they are very ill, or the standard of work has been increased and they need more training.
Andrea de Jongh, Employment Lawyer and Privacy Governance Specialist. Making legal concepts accessible.

Read More

Latest Cybersecurity News

May 05, 2024

The Joint Standard 1 of 2023 and the draft Joint Standard: Cybersecurity and Cyber Resilience Requirements, published by the FSCA and the Prudential Authority (PA), set the bar for cybersecurity practices, aiming to protect data, systems, and reputation. These standards align closely with the NIST cybersecurity framework, which includes five key functions: Identify, Protect, Detect, Respond, and Recover.

Read More

May 05, 2024

Cybersecurity is more than just technology—it’s about the convergence of people, business processes, and technologies. In this interconnected landscape, people are the vital link that can either strengthen or weaken your defences. That’s why cybersecurity training is crucial – to empower individuals to become the first line of defence, creating a robust human firewall against cyber threats.

Read More

May 05, 2024

Securing email has become an indispensable aspect of modern cybersecurity strategy. As a primary communication channel, email is vulnerable to cyber threats such as phishing and malware. The concept of securing email revolves around ensuring the authenticity, integrity, and confidentiality of email communications. Robust security measures help organisations to protect sensitive data, prevent breaches, and maintain stakeholder trust.

Read More

May 05, 2024

A third-party backup provider is crucial for cloud data storage because it adds an extra layer of security and control. Relying solely on cloud providers to safeguard an organisation’s data may leave it vulnerable to various risks. With a third-party backup solution, the business maintains ownership and control of its data backups independently, ensuring quick access and recovery in emergencies.

Read More