It allows me to be part of something truly extraordinary: working towards an Africa with no financial borders. I am passionate about helping improve the continent, and Kora provides an opportunity to do that while making good money.
Data breaches can occur in various ways, including through hacking, malware, phishing attacks, physical theft, or accidental exposure. When a data breach happens, it often results in the exposure, theft, or compromise of personal, financial, or sensitive information, which can have serious consequences for individuals, organisations, or even governments. Here is how to protect youself.
A guide to understanding internet cookies.
Key takeaways from our future of fintech in Africa 2023 report.
With Kora's Identity APIs, you can verify customer IDs in Ghana, Nigeria, South Africa, and Nigeria. Create a smooth and secure KYC and KYB onboarding process for your business.
The Kora Startup Kit is a directory of handpicked, pre-vetted companies we recommend to businesses like yours starting up in Africa.
Issue USD virtual cards for customers to pay for things online or their bills and also issue corporate cards for your business needs.
A post informing the general public about Kora's latest feature. Pay with Bank.
Sundown Sessions is more than an event; it is a gathering for Africa's brightest minds to unwind, network, and absorb insights from leaders in the fintech startup ecosystem.
A summary of the KoraHack23 Hackathon sponsored by Kora and Google Developers Group.
Kora partners with Healthracka to provide employees with free cervical cancer test kits.
Kora welcomed the Africa Caucus group from the Harvard Business School to their office in Lagos, Nigeria.
Located at the heart of the UK's fastest-growing region in terms of technology, Birmingham was chosen as Kora's first UK office because of its solid infrastructure and ease of access to talent.
In advertising, agencies always have to balance the client’s expectations and deliverables without overshooting the client’s budget. So, getting a tool that works was important. The first objective was to provide social media marketing services that delivered to client expectations while being cost-effective. So, they built a solution to cater to that need and now help other agencies get the same result for their clients, not just in Nigeria but worldwide.
To collect payments, Sadiq, the founder of the Ultimate Frisbee Club used Kora to create a payment link and shared it on the club’s WhatsApp group and it made the donations smooth and seamless. Using Kora also helped him build transparency because he could now export the finances of the community and share them with the rest of the organisers and sponsors.
Strategically using Kora to accept payments in Ghana, Detail Africa embraces a pan-African perspective. The move aligns with the company's expansion plans, demonstrating a commitment to reaching new markets across the continent.
How Oystr Finance is unlocking credit for Africa's unbanked.
For our International Women’s Month series, #EmbraceEquality, here’s Favour, a member of the People Operations team at Kora.
For our International Women’s Month series, #EmbraceEquality, here’s Promise, a Senior Product Manager at Kora.
For our International Women’s Month series, #EmbraceEquality, here’s Ayobami, a front-end engineer at Kora.
For our International Women's Month series, #EmbraceEquality, here's Ajiri, a Senior Product Designer at Kora.
If you research what security experts consider a “strong” password, you’ll find several different ideas. Most agree they should be long, yet no one seems to agree on how long. Some recommend using a mix of symbols and numbers, while others argue this makes passwords too difficult to remember. However, everyone does agree on one fact: Password strength is a vital part of security.
Criminals have taken a liking to targeting us through employees in our organisations. Even management isn't immune to their shenanigans like phishing, where they send you deceptive emails that look innocent. But beware, even your coworker's email could be under siege. So, here's a rule of thumb: if someone's asking for your PIN, bank info, or login details, it's time to raise an eyebrow.
Data breaches can occur in various ways, including through hacking, malware, phishing attacks, physical theft, or accidental exposure. When a data breach happens, it often results in the exposure, theft, or compromise of personal, financial, or sensitive information, which can have serious consequences for individuals, organisations, or even governments. Here is how to protect youself.
A guide to understanding internet cookies.