TWO-FACTOR AUTHENTICATION

Authentication factors are multiple authentication methods that can be used to verify a person’s identity. The bulk of Two-factor Authentication (2FA) methods focus on the first three authentication elements, and most authentication methods rely on knowledge, possession, inherence, or location. Two-factor authentication or 2FA, is a type of multi-factor authentication that uses two separate credentials […]

Consumer Fraud

Consumer fraud embodies a variety of misleading practices related to advertising, marketing, or purchase & sales of goods and services. It is an illicit activity that involves deceit and is perpetrated against an unsuspecting individual or group resulting in a financial loss. Consumer fraud is an international concern with millions of consumer complaints received by […]

PONZI SCHEME

My friend John Doe was introduced to a forex platform that pays a monthly interest rate of 15% plus. He had the option of investing his money for six months or a year. According to the investment contract, he might withdraw his funds before the end of the investment period, but only 70% of the […]

IDENTITY FRAUD

The use of someone else’s identity, such as their name, date of birth, current or prior addresses, to gain goods or services by deceit or commit a crime is known as identity fraud. These fraudsters are known as identity thieves. In 1964, the phrase “identity theft” was coined. Whether the victim is living or deceased, […]

FRAUD RESPONSE PLAN

A fraud response plan can be defined as a plan put in place by an organization to help establish authority levels, action roles and reporting lines in a case where fraud is suspected. If fraud is suspected, it should be reported to either your line manager, internal audit, finance director, officer in charge of procurement […]

DATA PROTECTION

DATA PROTECTION What is Data Protection? It is a practice that guarantees data collected is categorized, controlled, handled with care and in tandem with the provisions of laid down laws and regulations. Data Privacy and Protection Laws Section 37 of the 1999 constitution of Nigeria makes data protection a constitutional right. It provides that “The […]

WHISTLEBLOWING

The growth of whistleblowing began with the global financial crisis of 2007/2008, which reawakened the globe to the need for corporate corruption to be addressed. Whistleblowing is a word used when a person, generally an employee, discloses knowledge or activity within a private, public, or government institution that is unlawful, illicit, or fraudulent. Making a […]

PHISHING

Phishing is a sort of social engineering-based cyberattack. By impersonating a legitimate entity or institution, fraudsters contact their targets by sending fraudulent messages via email, text message, or phone call, tricking them into disclosing sensitive information such as passwords, credit card details, personally identifiable information, bank details, payment orders, and so on. The victims are […]

Open chat
Want to Become a Certified Fraud Examiner ?
Attend our next CFE exam review course and become a Certified Fraud Examiner in December 2022. Registration is Ongoing!
       Register Now for the CFE Exam Review Course Second Cohort.
     Date: March 24th - 27th, 2022.
FILL THE FORM BELOW AND WE WILL GIVE YOU A CALL IMMEDIATELY
* we never share your data with third parties.