WBNetADD connect
Direct contact

+32 16 43 11 00

info@add.be Contact us

You are here

Are you fraud-proof? The right insurance softens the pain somewhat!

13 April 2016


Regrettably, again this week there was a news report of a company that was the victim of fraud. The bad news is that none of us are immune to it. The good news is that there is an affordable insurance against it!

It is the harsh reality: the people in your organisation with great responsibilities in accounting or finance, are also very often in the position to set up well-concealed constructions and to bypass control. They do it to enrich themselves and/or to damage you. You can limit this risk by applying simple rules such as the “four-eyes principle”, which demands e.g. that every invoice must be approved by two people, independently of each other, in accordance with some well-defined instructions.

Where fraud by an employee starts from within your company, the risk is ever greater when third parties break into your IT-system from outside, to steal funds (= cybercrime) or to steal or damage data, to make your data inaccessible or even to destroy them completely (= Cyber risks).

Today, both risks, fraud by employees (either in co-operation with third parties or on their own) and the loss of data (including cybercrime) can now be covered by insurance. This means you will be protected from the financial loss, and, moreover, you will receive practical support from specialists in the research of the cause, in blocking the systematics of it, in restoring safety, as well as in the communication with third parties and dealing with liability claims.

Today, the cyber risk is at nr.1 of the top 10 risks that threaten the continuity of a company. Nearly 4 out of 10 Belgian companies have indicated that they have been hacked in the last year. The other 6 probably have been as well, but they just don’t know it yet. Therefore, insurance is not an unnecessary luxury, but an absolute necessity. Luckily, these insurance covers are not only affordable, but they offer 24/7 assistance, by the right specialist for your particular problem.

The table below points out 5 measures you can take to protect yourself from these risks:

Protective measures

ICT risksFraud risks

Make sure you have a watertight back-up system.

This implies a certain quality and frequency of back- ups.

Regardless of the fact whether your data are stored in the cloud or in your server room, you should better keep a back-up on an external carrier at all times, and that is completely unconnected to your IT-system.

Write down your policy and enforce:

- rules and standards of behaviour

- the four-eyes principle

- control mechanisms

- a sanctions policy


Protect your systems with a good (and up-to-date) firewall Write a specific policy for the acceptance of suppliers and the management of supplier's data.
Install high-quality anti-malware and keep it up to dateNourish an open company culture in which fraud is an item of discussion and any attempt to commit fraud is reported immediately
Update your software regularly; older versions are easier to access by criminals Always set a good example as manager

Last but not least: raise your employees' conscience as to the risks, by setting clear rules of conduct, by frequently checking they are followed, and by constantly reminding them of their importance

Carry out a careful staffing policy (from the beginning of the employment contract to its conclusion)

React quickly and adequately with each incident























These measures make you less attractive to criminals yet do not provide complete protection. Should you still suffer an attack, it is vital that you react fast and adequately. With ADD’s “ICT-care insurance policy”, you will benefit from good basic cover for only €500.

Do you have questions? Would you like a tailor-made offer? Contact our specialist in the matter, Paul Caekebeke, or contact your own trusted ADD contact person.

Some explanations:

damage, destruction, unavailability and/or theft of company and/ or personal data because of a break-in into your IT systems or because of a system failure, with the purpose of selling or damaging them.

a break-in by criminals into your IT systems in order to steal from you by transferring your money from your IT system to their accounts.

your company voluntarily transfers money to a third party on the basis of a fraudulent instruction or action. This could be instigated by an employee who wishes to gain from it or to cause you damage, or by a third party who has sent a fraudulent confidential mail in your name to an employee, ordering him/her to transfer a certain amount into a bank account.


Back to Paul Poll


Other news and events

  • Website: works in progress

    Our website is currently undergoing a behind-the-scenes makeover . You may experience some inconvenience because of this. We expect it back soon,...
    14 December 2022
  • Environment

    to 300,000 euros in costs: soil decontamination requires a special policy

    Soil contamination occurs faster than you think. Your company does not even have to work with chemicals or other pollutants to be at increased risk...
    11 February 2022
  • Environment

    Without environmental insurance, every business is at risk

    Many companies underestimate the risk of causing environmental damage , directly or indirectly. Moreover, they often wrongly (toevoegen : suppose the...
    04 February 2022
  • Here comes 2022

    28 December 2021
  • Trade credit

    Credit insurance and COVID-19: what after 30th June 2021?

    Since the outbreak of COVID-19, credit insurers have repeatedly expressed their fear of a wave of bankruptcies . But until today, the number of...
    19 May 2021