CBN Automated AML solution requirements: What every Nigerian financial institution needs to implement

On 10 March 2026, the Central Bank of Nigeria issued its Baseline Standards for Automated Anti-Money Laundering Solutions, and the financial sector’s relationship with manual compliance controls effectively came to an end. The circular applies to every institution under CBN oversight: banks, fintechs, mobile money operators, payment service providers, and international money transfer operators. No […]

How fraudsters bypass KYC in digital banks

Nigeria’s digital banking ecosystem has grown rapidly in recent years. Fintech platforms and digital lenders now allow customers to open accounts, apply for loans and send money entirely online. While this transformation has improved financial access, it has also created new opportunities for fraud. Many digital banks rely heavily on KYC verification to confirm customer […]

Company verification in Nigeria: Why it is the first line of defense against fraud

Company verification in Nigeria is no longer just a compliance requirement. In 2026, it has become a core element of cybersecurity, fraud prevention and regulatory alignment. As digital transactions increase across fintech, lending, e-commerce and financial services, the risks associated with onboarding unverified or fraudulent entities have grown significantly. At the center of company verification […]

Cybersecurity trends in Nigeria: Emerging threats and structural change

Cybersecurity in Nigeria is entering a new phase as public awareness continues to grow, yet the most significant transformation is unfolding behind the scenes. What once revolved around basic malware protection and perimeter defenses has evolved into a complex ecosystem shaped by artificial intelligence, digital banking expansion, regulatory enforcement and increasingly sophisticated fraud networks. In […]

How Numida Added a Dedicated Fraud Control Layer to Its Credit Models

Investing Beyond Credit Scoring to Strengthen the Loan Book Introduction Numida is a Y Combinator-backed digital SME lender operating across Kenya and Uganda. For nearly a decade, the company has invested heavily in credit scoring and operational systems to support responsible unsecured lending at scale. As volumes grew, the team made a deliberate distinction. Credit […]

SMEDAN and Cyber Security in Nigeria: Protecting SME data and compliance in 2026

The growth of small and medium enterprises in Nigeria is closely linked to the work of Small and Medium Enterprises Development Agency of Nigeria. SMEDAN plays a central role in supporting business formalization, CAC registration, access to funding and regulatory alignment. However, as more SMEs digitize their operations and integrate fintech services, cyber security has […]

Fraud patterns in Nigeria’s digital economy and how risk teams prevent them

Nigeria’s digital economy continues to expand rapidly across fintech, lending, payments and online services. With this growth comes a parallel increase in fraud sophistication. Fraud patterns are no longer isolated incidents but structured operations that combine identity manipulation, transaction abuse and regulatory gaps. Understanding these patterns is essential for modern cybersecurity teams, compliance officers and […]

What is the CAC for business verification in Nigeria, and why does it go beyond registration?

In Nigeria, CAC stands for the Corporate Affairs Commission, the government body responsible for registering and regulating businesses. For many companies, CAC is treated as a one-time administrative step, something completed at the beginning and rarely revisited. In reality, CAC is one of the most underused security tools in the Nigerian business ecosystem. A business […]

How teams can respond to emerging threats

Cyber security in Nigeria is entering a new phase in 2026. Digital services are expanding faster than security teams can adapt, and cyber threats are no longer isolated technical incidents but complex fraud ecosystems built around data abuse, identity manipulation and transaction exploitation. For fraud analysts, security teams and compliance professionals, the challenge is not […]

Request more information

Request more information

Request more information

Request more information

Request more information

Request more information

Request more information