Millions of people fall victim to Identity theft each year, and it can happen to even you if you don’t take the proper precautions. In this post, you'll learn how to recognize identity theft and how to protect yourself from falling victim.
You can expose yourself to scammers by scanning a QR code. It's called quishing. Read this post to learn about it and how to protect yourself.
Learn the benefits of cross-border payments and how you can start accepting them.
Learn how you can use cross-border gateways to accept business payments from customers across countries in Africa.
A post informing the general public about Kora's latest feature. Pay with Bank.
A summary of the KoraHack23 Hackathon sponsored by Kora and Google Developers Group.
Kora partners with Healthracka to provide employees with free cervical cancer test kits.
Kora welcomed the Africa Caucus group from the Harvard Business School to their office in Lagos, Nigeria.
Advice for women in tech from women in tech.
New product to help accelerate Africa’s participation in global trade.
Kora is now an ISO 27001 & ISO 22301-certified organization
We moved our URL address and updated our name. Read this to find out why.
The very first of our new series, Into the Koraverse.
The origin story of Africa's biggest logistics company.
In this month's Merchant Stories entry, the CEO, Ifeoluwa Dare-Johnson, tells us about the company's early days and how she got the idea for the business.
What is now known as MyXalary started as a way to manage employee databases, taxes, and pensions. When that became stable, the cofounders began advancing the software by adding features.
For our International Women’s Month series, #EmbraceEquality, here’s Favour, a member of the People Operations team at Kora.
For our International Women’s Month series, #EmbraceEquality, here’s Promise, a Senior Product Manager at Kora.
For our International Women’s Month series, #EmbraceEquality, here’s Ayobami, a front-end engineer at Kora.
For our International Women's Month series, #EmbraceEquality, here's Ajiri, a Senior Product Designer at Kora.
Cybercriminals have upped their game. Have you? Look out for these red flags so you don’t fall for cybercriminals’ tricks.
If you research what security experts consider a “strong” password, you’ll find several different ideas. Most agree they should be long, yet no one seems to agree on how long. Some recommend using a mix of symbols and numbers, while others argue this makes passwords too difficult to remember. However, everyone does agree on one fact: Password strength is a vital part of security.
Criminals have taken a liking to targeting us through employees in our organisations. Even management isn't immune to their shenanigans like phishing, where they send you deceptive emails that look innocent. But beware, even your coworker's email could be under siege. So, here's a rule of thumb: if someone's asking for your PIN, bank info, or login details, it's time to raise an eyebrow.
Data breaches can occur in various ways, including through hacking, malware, phishing attacks, physical theft, or accidental exposure. When a data breach happens, it often results in the exposure, theft, or compromise of personal, financial, or sensitive information, which can have serious consequences for individuals, organisations, or even governments. Here is how to protect youself.