{"type":"document","data":{"id":"4fffe134-726e-4fb8-822b-2ffab700d10b","localeString":"en-GB","publishDate":"2024-12-10T12:15:51.913+01:00","contentType":"onecms:editorialPage","hasMacro":false,"flexPageMetadata":{"afmBanner":false,"robotInstruction":{"noIndex":false,"noFollow":false},"description":"Follow the advice of our experts and protect your company’s funds."},"mainHeaderZone":{"componentType":"editorialHeader","coreHeader":{"title":"Financial fraud","subtitle":"Follow the advice of our experts and protect your company’s funds."},"backLink":{"textLink":{"url":"/en/business/news/secure-business","text":"Secure business"}},"date":"2024-12-10","readingTime":5},"flexZone":{"flexComponents":[{"componentType":"paragraph","richBody":{"value":"<p></p>"},"alignedImage":{"position":"top","transformBaseUrl":"https://assets.ing.com/transform/216e65cf-c100-4d8d-849b-b7752ebe75d3/Female-nurse-inputing-medical-data-into-computer","altTextEN":"\"\"","altTextNL":"\"\"","altTextFR":"\"\"","altTextDE":"\"\"","original":"https://assets.ing.com/m/7fc7c6c460b89a3d/original/Female-nurse-inputing-medical-data-into-computer.jpg","extension":"jpg"}},{"componentType":"highlight","title":"Protect your professional account against criminals. Follow our free training.","richBody":{"value":"<p>Cases of financial fraud are numerous and the losses for our Belgian companies are significant. Register for one of our free online training sessions and learn how to protect your company against CEO fraud, invoice fraud and phishing. Register now and earn 1 ITAA point (if affiliated).</p><p><a href=\"https://www.ing-events.be/financialfraudtraining25/fr/registration\">Sign up here</a> (Please note that sessions are in French or Dutch)</p>"}},{"componentType":"sectionTitle","title":"Social engineering or CEO fraud"},{"componentType":"paragraph","title":"Be careful with any request to transfer money urgently and secretly.","richBody":{"value":"<p><span><span><span><span><span><span>Social engineering involves gathering information about a target company in order to subsequently manipulate an internal employee of that company into taking a particular action (often a payment) or revealing confidential information.</span></span></span></span></span></span></p>"},"textLinks":[{"url":"/en/business/news/secure-business/ceo-fraud","text":"How can you protect your business against CEO fraud?"}]},{"componentType":"sectionTitle","title":"Invoice fraud"},{"componentType":"paragraph","richBody":{"value":"<p><span><span><span><span><span><span><span>Fraud involving invoices is common. In such cases, the scammers replace the bank details of the company that issued the invoice with their own in order to collect the invoiced amounts.</span></span></span></span></span></span></span></p>"},"textLinks":[{"url":"/en/business/news/secure-business/invoice-fraud","text":"Protect your business against invoice fraud"}]},{"componentType":"sectionTitle","title":"Fraud involving the European or SEPA direct debit system"},{"componentType":"paragraph","richBody":{"value":"<p><span><span><span><span><span><span>These cases of fraud mainly affect associations and non-governmental organisations that are financed by donations. Generally, the account number to which donations can be made is listed on their website. Some malicious persons abuse this account number to set up fraudulent recurring direct debit payments.</span></span></span></span></span></span></p>"},"textLinks":[{"url":"/en/business/news/secure-business/direct-debit-fraud","text":"How can you protect your organisation?"}]},{"componentType":"highlight","title":"Train your accounting department on financial fraud","richBody":{"value":"<p><span><span><span><span><span><span><span>We&apos;ve created a booklet on financial fraud for companies. It provides an easy-to-use foundation for training your accounting department. Your financial department employees are your first line of defence against financial fraud. They must understand how fraudsters operate. </span></span></span></span></span></span></span></p><p><a href=\"https://assets.ing.com/m/1b59eaaf01742dd1/original/721364E-Brochure-Cybercrime-and-Fraud.pdf\">Download the booklet</a></p>"}}]},"complementaryZone":{"flexComponents":[{"componentType":"sectionTitle","title":"Also interesting!"},{"componentType":"cards","cards":[{"componentType":"articleCard","cardType":"article","cardSize":"medium","title":"Learn how to keep your business safe","body":"Don’t get taken hostage by cybercriminals","image":{"transformBaseUrl":"https://assets.ing.com/transform/29a371fd-c819-403d-a7ae-3bac05a29854/Large_MS-PPT_Web-Dusk-shot-of-railway-tracks-and-signals-leading-off-into-the-distance","type":"image","width":1920,"original":"https://assets.ing.com/m/1f344e19bf9a57ce/original/Large_MS-PPT_Web-Dusk-shot-of-railway-tracks-and-signals-leading-off-into-the-distance.jpg","extension":"jpg"},"date":"2023-05-10","link":{"url":"/en/business/news/secure-business/i-protect-my-business"}},{"componentType":"articleCard","cardType":"article","cardSize":"medium","title":"Data protection","body":"Your company's data under lock and key for cybercriminals","image":{"transformBaseUrl":"https://assets.ing.com/transform/fc9603fa-80b2-4d1b-9354-9c1992ff3eb9/Teenage-girl-playfully-opens-locked-door-and-hides-behind-it","type":"image","width":5616,"altTextEN":"\"","altTextNL":"\"","altTextFR":"\"","altTextDE":"\"","original":"https://assets.ing.com/m/68957aad44d2466e/original/Teenage-girl-playfully-opens-locked-door-and-hides-behind-it.jpg","extension":"jpg"},"date":"2023-05-10","link":{"url":"/en/business/news/secure-business/protect-business-data"}}]}]}}}