TWO-FACTOR AUTHENTICATION

Authentication factors are multiple authentication methods that can be used to verify a person’s identity. The bulk of Two-factor Authentication (2FA) methods focus on the first three authentication elements, and most authentication methods rely on knowledge, possession, inherence, or location. Two-factor authentication or 2FA, is a type of multi-factor authentication that uses two separate credentials […]

Consumer Fraud

Consumer fraud embodies a variety of misleading practices related to advertising, marketing, or purchase & sales of goods and services. It is an illicit activity that involves deceit and is perpetrated against an unsuspecting individual or group resulting in a financial loss. Consumer fraud is an international concern with millions of consumer complaints received by […]

PONZI SCHEME

My friend John Doe was introduced to a forex platform that pays a monthly interest rate of 15% plus. He had the option of investing his money for six months or a year. According to the investment contract, he might withdraw his funds before the end of the investment period, but only 70% of the […]

IDENTITY FRAUD

The use of someone else’s identity, such as their name, date of birth, current or prior addresses, to gain goods or services by deceit or commit a crime is known as identity fraud. These fraudsters are known as identity thieves. In 1964, the phrase “identity theft” was coined. Whether the victim is living or deceased, […]

DATA PROTECTION

DATA PROTECTION What is Data Protection? It is a practice that guarantees data collected is categorized, controlled, handled with care and in tandem with the provisions of laid down laws and regulations. Data Privacy and Protection Laws Section 37 of the 1999 constitution of Nigeria makes data protection a constitutional right. It provides that “The […]

WHISTLEBLOWING

The growth of whistleblowing began with the global financial crisis of 2007/2008, which reawakened the globe to the need for corporate corruption to be addressed. Whistleblowing is a word used when a person, generally an employee, discloses knowledge or activity within a private, public, or government institution that is unlawful, illicit, or fraudulent. Making a […]

Open chat
Want to Become a Certified Fraud Examiner ?
Attend our next CFE exam review course and become a Certified Fraud Examiner in December 2022. Registration is Ongoing!
       Register Now for the CFE Exam Review Course Second Cohort.
     Date: March 24th - 27th, 2022.
FILL THE FORM BELOW AND WE WILL GIVE YOU A CALL IMMEDIATELY
* we never share your data with third parties.