If you research what security experts consider a “strong” password, you’ll find several different ideas. Most agree they should be long, yet no one seems to agree on how long. Some recommend using a mix of symbols and numbers, while others argue this makes passwords too difficult to remember. However, everyone does agree on one fact: Password strength is a vital part of security.
Strategically using Kora to accept payments in Ghana, Detail Africa embraces a pan-African perspective. The move aligns with the company's expansion plans, demonstrating a commitment to reaching new markets across the continent.
Criminals have taken a liking to targeting us through employees in our organisations. Even management isn't immune to their shenanigans like phishing, where they send you deceptive emails that look innocent. But beware, even your coworker's email could be under siege. So, here's a rule of thumb: if someone's asking for your PIN, bank info, or login details, it's time to raise an eyebrow.
Data breaches can occur in various ways, including through hacking, malware, phishing attacks, physical theft, or accidental exposure. When a data breach happens, it often results in the exposure, theft, or compromise of personal, financial, or sensitive information, which can have serious consequences for individuals, organisations, or even governments. Here is how to protect youself.
A post informing the general public about Kora's latest feature. Pay with Bank.
A summary of the KoraHack23 Hackathon sponsored by Kora and Google Developers Group.
Kora partners with Healthracka to provide employees with free cervical cancer test kits.
Kora welcomed the Africa Caucus group from the Harvard Business School to their office in Lagos, Nigeria.
Advice for women in tech from women in tech.
New product to help accelerate Africa’s participation in global trade.
Kora is now an ISO 27001 & ISO 22301-certified organization
We moved our URL address and updated our name. Read this to find out why.
The very first of our new series, Into the Koraverse.
What is now known as MyXalary started as a way to manage employee databases, taxes, and pensions. When that became stable, the cofounders began advancing the software by adding features.
For our International Women’s Month series, #EmbraceEquality, here’s Favour, a member of the People Operations team at Kora.
For our International Women’s Month series, #EmbraceEquality, here’s Promise, a Senior Product Manager at Kora.
For our International Women’s Month series, #EmbraceEquality, here’s Ayobami, a front-end engineer at Kora.
For our International Women's Month series, #EmbraceEquality, here's Ajiri, a Senior Product Designer at Kora.
If you research what security experts consider a “strong” password, you’ll find several different ideas. Most agree they should be long, yet no one seems to agree on how long. Some recommend using a mix of symbols and numbers, while others argue this makes passwords too difficult to remember. However, everyone does agree on one fact: Password strength is a vital part of security.
Criminals have taken a liking to targeting us through employees in our organisations. Even management isn't immune to their shenanigans like phishing, where they send you deceptive emails that look innocent. But beware, even your coworker's email could be under siege. So, here's a rule of thumb: if someone's asking for your PIN, bank info, or login details, it's time to raise an eyebrow.
Data breaches can occur in various ways, including through hacking, malware, phishing attacks, physical theft, or accidental exposure. When a data breach happens, it often results in the exposure, theft, or compromise of personal, financial, or sensitive information, which can have serious consequences for individuals, organisations, or even governments. Here is how to protect youself.
A guide to understanding internet cookies.