Mauritian FSC names and shames firm for Email Security Failure Causing Unauthorised Transfer of Client Funds
21/04/2026
Comsure Compliance Briefing:
FSC Mauritius Public Censure of Finsburey Management Services Ltd (FMSL) – IT Controls, Cybersecurity & Operational Resilience Failures

https://www.fscmauritius.org/media/0wtnbf1q/fmsl-public-censure-notice-final.pdf
This case serves as a clear warning and practical benchmark: licensed entities in Mauritius (and those servicing Mauritian structures) should immediately verify and strengthen their email security, payment verification procedures, and IT governance frameworks.
Executive Summary
- On 17 April 2026, the Financial Services Commission (FSC) Mauritius publicly censured Finsburey Management Services Ltd (FMSL), a licensed management company, for
- Serious deficiencies in its email security and broader IT controls.
- These failures directly enabled an unauthorised transfer of client funds to a third party.
- The Enforcement Committee found breaches of
- The Financial Services Act,
- The Code of Business Conduct, and
- The Guidelines for Management Companies,
- The Enforcement Committee specifically cited
- Lack of due skill and care,
- Inadequate email security systems, and
- Insufficient IT internal controls relative to the company’s risk profile.
Name and Shame
- “The Enforcement Committee (EC) of the FSC had, on 25 August 2023, issued a public censure to Finsburey Management Services Ltd (FMSL).” “The decision of the EC is therefore effective as from 2 June 2025.”
- That is the full and only punishment.
- A public censure is a formal public reprimand by the regulator.
- It is serious because it damages the firm’s reputation and signals weak controls to clients and partners, but it does not involve any financial penalty or stop the company from operating.
Specific regulatory breaches identified by the FSC Enforcement Committee:
- Sections 18(2) and 18(3) of the Financial Services Act (FSA) – Failure to implement and maintain a correctly functioning email security system with adequate security features as part of its overall IT system.
- Paragraph 4.1 of the Code of Business Conduct – Failure to act with due skill, care and diligence towards customers.
- Paragraph 4.8 of the Code of Business Conduct – Failure to maintain adequate controls relating to its IT system.
- Paragraph 14.3 of the Guidelines for Management Companies – Failure to have IT-related internal controls that were adequate for the size, nature and complexity of its business activities.
What Happened – The Issues
- Finsburey Management Services Ltd
- Suffered a significant loss of client funds due to an unauthorised third-party fund transfer.
- The root trigger was a failure in its email and IT systems:
- The company could not detect that legitimate-looking fund transfer instructions had originated from an unauthorised source.
Key outcome:
- Client funds were transferred without the client’s knowledge or consent.
- This was not an isolated operational error it was a direct result of deficient IT governance and cybersecurity controls.
Root Causes (as determined by the FSC)
The notice explicitly identifies:
- The inadequate implementation and maintenance of an email security system within FMSL’s broader IT framework as the core failure.
In practical terms, this typically manifests as:
- Absence or misconfiguration of core email authentication protocols (e.g., SPF, DKIM, DMARC).
- No effective email security gateway or advanced threat protection (e.g., sandboxing, URL/link scanning, impersonation detection).
- Lack of multi-layered verification for high-risk instructions (fund transfers).
- Insufficient ongoing monitoring, testing, or updating of IT controls to match the risk profile of a management company handling client assets.
- No (or inadequate) segregation of duties or secondary confirmation procedures for payment instructions received via email.
GAPS
- These gaps allowed a business email compromise (BEC)-style attack or spoofed email to succeed undetected, a common vector in the financial services sector.
Regulatory Context & What This Signals
This censure is part of a clear and intentional shift by the FSC Mauritius: Regulatory scrutiny is no longer limited to AML/CFT.
- IT governance, cybersecurity, data protection, and operational resilience are now front-and-centre enforcement priorities.
- Weak technology controls can trigger public censure even without proven fraud or AML breaches the mere failure to prevent client loss is enough.
- Public censure carries significant reputational, commercial and licensing risk (especially for management companies servicing global clients who expect robust controls).
The FSC is sending a strong message: Compliance today is holistic. Firms must demonstrate equally robust controls across financial crime and technology/operational risk.
What Firms Must Do to Avoid This Outcome (Practical Action Plan)
To prevent similar incidents and demonstrate compliance with FSA, Code of Business Conduct, and Management Company Guidelines, licensed entities should immediately implement or strengthen the following:
Immediate / High-Priority Controls (0–3 months)
- Deploy enterprise-grade email security
- Implement a modern email security gateway (e.g., Mimecast, Proofpoint, Microsoft Defender for Office 365 with advanced threat protection).
- Enforce full SPF + DKIM + DMARC (with “reject” or “quarantine” policy).
- Enable AI-driven impersonation protection and URL/link sandboxing.
- Institute mandatory dual verification for all fund movements
- “Call-back” or out-of-band confirmation (phone/SMS/secure portal) for any payment instruction received by email never rely on email alone.
- Require dual approval (maker-checker) within the firm for all client transfers.
- Conduct an independent IT & cybersecurity gap assessment
- Engage a qualified external auditor to review email systems, IT controls, and operational resilience against Paragraph 14.3 of the Guidelines.
Medium-Term / Ongoing Measures (3–12 months)
- Update and test the Business Continuity & Disaster Recovery Plan and Incident Response Plan specifically for BEC/cyber events.
- Implement regular penetration testing and red-team exercises focused on email and payment processes.
- Deliver mandatory staff awareness training on BEC, phishing, and verification procedures (with simulated attacks).
- Maintain clear IT governance documentation (policies, procedures, risk assessments) that explicitly links controls to the size/nature/complexity of the business.
- Establish ongoing monitoring & reporting to senior management/board on IT control effectiveness (key risk indicators).
Governance & Oversight
- Ensure the Board and Compliance Officer receive regular, independent assurance on IT/operational resilience.
- Document all remedial actions taken in response to this censure (even if not directly applicable) this demonstrates proactive compliance culture.
Recommended Documentation to Maintain
- IT Risk Register & Control Framework
- Email Security Policy & Configuration Baseline
- Payment Verification Procedure (with call-back protocol)
- Annual IT Control Effectiveness Report
- Incident logs and lessons-learned register
Bottom Line for Compliance Teams
- This case is a textbook example of how one weak link in email security can lead to client loss and regulatory sanction. The FSC has moved beyond “tick-box” AML checks and is now actively enforcing technology and operational resilience standards.
- Firms that treat cybersecurity and IT controls as seriously as AML/CFT with proper investment, testing, and governance will not only avoid censure but will also strengthen client trust and competitive positioning.
Key Signals:
- Regulatory scrutiny has expanded well beyond AML/CFT into IT governance, cybersecurity, and operational resilience.
- A single weak link in email/IT controls can now trigger public censure, client loss, and significant reputational damage.
- Firms must treat technology and operational risk with the same rigour as financial crime compliance.
Sources & References
- Official FSC Mauritius Public Censure Notice (PDF – full communiqué): https://www.fscmauritius.org/media/0wtnbf1q/fmsl-public-censure-notice-final.pdf
- FSC Mauritius Website – Public Notices section (announcement page dated 17 April 2026): https://www.fscmauritius.org/
- Original LinkedIn post referencing the communiqué (for context): https://lnkd.in/dCEhaBUK
The Team
Meet the team of industry experts behind Comsure
Find out moreLatest News
Keep up to date with the very latest news from Comsure
Find out moreGallery
View our latest imagery from our news and work
Find out moreContact
Think we can help you and your business? Chat to us today
Get In TouchNews Disclaimer
As well as owning and publishing Comsure's copyrighted works, Comsure wishes to use the copyright-protected works of others. To do so, Comsure is applying for exemptions in the UK copyright law. There are certain very specific situations where Comsure is permitted to do so without seeking permission from the owner. These exemptions are in the copyright sections of the Copyright, Designs and Patents Act 1988 (as amended)[www.gov.UK/government/publications/copyright-acts-and-related-laws]. Many situations allow for Comsure to apply for exemptions. These include 1] Non-commercial research and private study, 2] Criticism, review and reporting of current events, 3] the copying of works in any medium as long as the use is to illustrate a point. 4] no posting is for commercial purposes [payment]. (for a full list of exemptions, please read here www.gov.uk/guidance/exceptions-to-copyright]. Concerning the exceptions, Comsure will acknowledge the work of the source author by providing a link to the source material. Comsure claims no ownership of non-Comsure content. The non-Comsure articles posted on the Comsure website are deemed important, relevant, and newsworthy to a Comsure audience (e.g. regulated financial services and professional firms [DNFSBs]). Comsure does not wish to take any credit for the publication, and the publication can be read in full in its original form if you click the articles link that always accompanies the news item. Also, Comsure does not seek any payment for highlighting these important articles. If you want any article removed, Comsure will automatically do so on a reasonable request if you email info@comsuregroup.com.