DD
MM
YYYY

PAGES

DD
MM
YYYY

spot_img

PAGES

Home Blog Page 7192

Your New Bank Account

0

Wema’s ALAT can help you open a bank account. Just like that, via your smartphone, you can have a new bank account. Other bank apps have such features. But they have to look for those customers. The question is thus: why not make it possible so that any customer account in Jumia, Konga or Yudala could be offered a bank account?

Yes, interesting. As we move into personalization and deepening of our national identity, I see opportunities where vertical partnerships would emerge for banks. If you are a merchant that grosses over N2 million monthly, you would login into your Jumia account to see a button that says ‘Open a Bank Account”.

Because Jumia has all your data, you hit “Apply”. Within minutes a bank account is ready from say Diamond Bank. Why would you do that? Jumia promises you that any balance in your account is immediately going to be earning interest from Diamond Bank.

Great things would happen in the land. We need to improve our national identification. BVN is working on that. We would experience a new level of innovation in partnership.

I believe that banks do not need to do most things they are doing today – they just have to explore smarter partnerships. The key to making these ideas work would be automation, AI and personalization. It is a global trend with JP Morgan committing $10.8 billion on annual tech spending.

We are at the early phase of the redesign. As Zenith Bank and Ecobank work with Facebook and Mastercard, expect your Facebook account to become ideally a “bank account”. If they push it a little more, you can get a bank account from a real bank via your Facebook account, depending on the transaction volume Facebook Corp has captured over time on this partnership. If you bring the banking services to Facebook, why not allow new people to join via Facebook?

One of the biggest entrepreneurial opportunities in Nigeria over the next few years would be identifying and validating Nigerians online. Just that it has not been done reminds me that in this land we have massive latent opportunities for glory.

14.3 – Policy Troubleshooting

0

After the security policy has been in the organization for some period of time – that can be anywhere from three months to a year, depending on the organization, the organization information security controls should be checked against the applicable policies. Ensure that each policy is being adhered to, as proposed, and is still applicable […]

This post is only available to members.

14.2 – Policy Types & Standards

0

Simply put, creating security policies is not easy. The procedure of getting a security policy is expensive, difficult and time-consuming. Usually organizations have two choices: To write a custom policy, hire a security professional for your organization. To write by yourself, you can use purchased guides or resources found on the internet. The first option […]

This post is only available to members.

14.1 – Policy Development – Process & Lifecycle

0

Policy Development Process includes the following: Develop policies that you plan to implement: A policy that you are unable or unwilling to implement is useless. If your policy states that internet usage is strictly allowed to conduct office related work, but you do not block website access or have the competency to monitor internet activity […]

This post is only available to members.

14.0 – Security Policy and Law

0

Security Policy is a set of high-level instructions. These instructions describe an organization’s entire security strategy. Policy is typically high level and strategic, and if it’s of high level; it seldom changes. With policy, you can have an appropriate security plan. Indeed, while your business may have lots of security controls, you may still not […]

This post is only available to members.