• Process
  • Testimonials
  • Benefits
  • Additional Covers
  • Information
  • Partners
  • Contact Us
admin@hunterbroking.com.au
(07) 3279 6592
Cyber Protect Cyber Protect
  • Process
  • Testimonials
  • Benefits
  • Additional Covers
  • Information
  • Partners
  • Contact Us
  • (07) 3279 6592

Partners

Entag

Entag is an innovative and solution-focused technology partner with a consultative approach to design, delivery, and support of strategic ICT solutions. Collaboration, productivity, and security are the core focus of transitioning our clients to future ways of working. To achieve this, we adopt and value a technology mix consisting of software as a service, cloud compute, mobile applications, and cloud communications, along with offering a range of managed services to provide ongoing support in these areas.

Blackguard

We specialize in providing customized IT Support Solutions to small and medium sized organisations. We understand that technology is a critical component of your business, and our mission is to ensure that your systems are running efficiently and effectively at all times. Blackguard was born out of the enormous increase of cyber fraud, malicious activity and other nefarious cyber threats since the rise of cloud applications and platforms such as Office 365. We recognised that existing IT Support companies simply weren’t equipped or had the expertise to protect modern day companies that rely on the cloud.

Black Ink Legal

  • Commercial
  • Corporate
  • Website Terms and Conditions
  • Privacy and Data Protection
  • Company Set Up
  • Intellectual Property
  • Commercial Property
  • Fixed and Discretionary Trusts
  • Legal Health Check

Cymax

Cymax can assist your organisation with specific questions related to your ICT infrastructure.
In addition, we offer the following services:

  • Security and infrastructure audits
  • Essential 8 Maturity assessments and ongoing alignment to security standards
  • Microsoft 365 security audits
  • Managed IT and ICT services
  • Penetration (Pen) Testing (red and blue)
  • Digital Transformation
  • Managed Disaster Recovery and Business Continuity for your ICT infrastructure
  • Post-breach incident reconstruction
  • Virtual CISO (Chief Information Security Officer)
  • Virtual CIO (Chief Information Officer)
  • ISO 27001
  • SEIM, SOC, SOAR
View

Cyber Guys

With cyber-attacks costing Australian businesses over $50,000 per attack, the risk for small business owners has never been higher. At Cyber Guys, we specialize in providing pioneering cyber security tools, tailored training, simulations, and solutions for businesses of all sizes, including SMEs in Brisbane, Sydney, and Melbourne. Recognizing that in smaller businesses, the primary threat often stems from a lack of training, we focus on empowering your people as your greatest defence against cybercrime. Our customised services encompass user awareness training, security standard compliance, ongoing cloud services security hardening, vCIO services, and ongoing attack simulations via email, phone, and SMS. Additionally, we offer technical and security consulting to strengthen traditional IT networks and educate staff on the escalating cybercrime landscape. With Cyber Guys, you can concentrate on your company’s core activities, assured that your data is secure.

View

We specialize in providing customized IT Support Solutions to small and medium sized organisations. We understand that technology is a critical component of your business, and our mission is to ensure that your systems are running efficiently and effectively at all times. Blackguard was born out of the enormous increase of cyber fraud, malicious activity and other nefarious cyber threats since the rise of cloud applications and platforms such as Office 365. We recognised that existing IT Support companies simply weren’t equipped or had the expertise to protect modern day companies that rely on the cloud. We are a Brisbane based IT company who’s mission is simple:

Provide exceptional IT Support while protecting our customer’s data at all times.

Our Services:

Black Ink Legal

Commercial

  • 1-Page NDA
  • Confidentiality Agreement
  • Deed of Amendment
  • Deed of Guarantee
  • Deed of Novation
  • Deed of Termination and Release
  • Services Agreement for a Single Client
  • Terms of Business for Services
  • Data Protection Policy

Website Documents

  • Privacy Policy
  • Website Returns Policy
  • Website Terms of Use

Company Secretarial

  • Adoption or replacement of constitution (shareholder approvals package)
  • Appointment of company officers (director approvals package)
  • Change of company name (shareholder approvals package)
  • Constitution – proprietary company limited by shares
  • Deed of Access and Indemnity
  • Execution of documents (director approvals package)
  • Power of Attorney – execution of documents
  • Resignation of company officers (director approvals package)

Corporate

  • Business Sale Agreement
  • Shareholders’ or Unitholders’ Deed

Dispute Resolution

  • Deed of Settlement and Release

Finance

  • Loan or Loan Facility Agreement

Intellectual Property

  • Deed of Assignment of IP
  • IP Licence Agreement

Legal Health Check

  • Legal Health Check

Property

  • Commercial Lease (non-retail)
  • Transfer of Lease

Trusts

  • Family Trust Deed
  • Unit Trust Deed

Entag is an innovative and solution-focused technology partner with a consultative approach to design, delivery, and support of strategic ICT solutions. Collaboration, productivity, and security are the core focus of transitioning our clients to future ways of working. To achieve this, we adopt and value a technology mix consisting of software as a service, cloud compute, mobile applications, and cloud communications, along with offering a range of managed services to provide ongoing support in these areas.

We are a regional QLD based organisation, with our head office in Birtinya on the Sunshine Coast and offices in Brisbane. As such, we have a good understanding of the challenges faced in regional areas and have a history of success across various industries at all levels in both regional and metropolitan areas. We believe it is crucial that end user support can be provided regardless of location and operate providing full end to end Managed Services.

As businesses increasingly leverage mobile data and cloud computing technologies, we focus on enabling end users to work securely from anywhere with access to a device and internet connection. Entag provides best of breed business and technology solutions, with proactive recommendations by our dedicated team of Business and Technology Consultants, Account Managers, Solution Architects, experienced Project Managers, and service delivery specialists.

Our end-to-end delivery and managed services enhance your business’s ability to implement new technology while reducing the traditional inhouse management costs. We continually employ new technology in-house and we consult with clients leveraging our knowledge of their existing environment to design and deliver tailored solutions and the right technologies.

Awarded Telstra QLD Enterprise Partner of the Year for 2021 and 2022, Entag partner with Telstra, Cisco, Microsoft, Ubiquiti and Cradlepoint to provide cloud first network solutions for our customers. We are a Certified Gold Partner with Telstra for collaboration, delivering a range of digital calling solutions and provide full suite of managed services to support and maximise your technology investment.

  • Tier 1 Integrated Mobile and Data Networks • Cloud Phone System & Collaboration Platforms (TIPT & Telstra Calling for Office 365) Unique End to End Managed Services Offering • Mobile and Cloud first strategy & access to Technology Funding via Telstra Telstra Certifications (Platinum being the highest)
  • Networks (Data & IP) [Platinum]
  • Cloud [Gold]
  • Mobility [Gold]
  • Collaboration (TIPT) [Gold] Microsoft Gold Partner
  • Cloud Platform [Gold] • Cloud Productivity [Gold]
  • Small & Mid-Market Cloud Solutions [Gold] • Windows & Devices [Gold]
  • Collaboration & Content [Silver] • Communications [Silver]
  • Enterprise Mobility Management [Silver] Certifications Cisco Meraki and Microsoft Our Managed ICT team hold current Cisco Meraki Network Associate (CCNA) accreditation and we have Microsoft certifications in the following categories
  • Cloud Productivity MS-100
  • Communications MS-700
  • Project & Portfolio Management MS-700
  • Collaboration & Content MS-700
  • Cloud Platform AZ-104
  • Security MS-500 & AZ-500
  • Enterprise Mobility Management MS-100 & MS-101 For further detail

Our Purpose, Culture and Community Our Purpose: Creating future ready careers for our people and innovative tech solutions for our customers.

Our Vision: “To make technology meaningful for our customers”

OPTIONAL COVER - Joint Venture and Consortium Cover

The cover provided under Section B – Loss To Others section of this policy is extended to your participation in a joint venture or consortium you have declared to us.

This Optional Cover – Joint Venture And Consortium Cover applies only if you have declared to us the estimated total revenue to be received from the joint venture or consortium for the coming 12 month period and the joint venture or consortium is named in your schedule.

This Optional Cover covers you only. No other participant in such joint venture or consortium, and no other third party, has any rights under this policy, nor shall we be liable to pay a contribution to any insurer of any other participant in such joint venture or consortium.

Section F – Exclusion 21 of the policy is varied to the extent of this Optional Cover – Joint Venture And Consortium Cover.

OPTIONAL COVER - Tangible Property

We will pay the cost of the replacement or repair of your IT hardware that is physically damaged or no longer suitable for use solely and directly because of a cyber event covered under this policy or the incurring of related cyber event response costs.

Section F – Exclusion 1 of the policy is varied to the extent of this Optional Cover – Tangible Property Cover.

OPTIONAL COVER - Criminal Financial Loss

We will pay a direct financial loss to you or a direct financial loss to others directly arising out of:

  1. cyber theft;
  2. socially engineered theft;
  3. identity-based theft;
  4. telephone phreaking; or
  5. cryptojacking

that is first discovered by you and notified to us in the policy period.

Section F – Exclusion 19 of the policy is varied to the extent of this Optional Cover – Criminal Financial Loss Cover.

For the purposes of this Optional Cover – Criminal Financial Loss Cover only, we will pay pursuit costs of up to a maximum of $50,000 paid with our agreement and consent to a third party (other than a law enforcement officer or your current or former employee or IT contractor), as reward for assistance leading to the arrest and conviction of the perpetrator of a cyber theft, socially engineered theft, identity-based theft, telephone phreaking or cryptojacking.

For the purposes of this Optional Cover – Criminal Financial Loss Cover only, the words listed below have been given a specific meaning and these specific meanings apply:

direct financial loss means

  1. your funds, accounts receivable or securities, or the funds, accounts receivable or securities in your control belonging to others, that are lost due to cyber theft, identity-based theft or socially engineered theft and remain unrecoverable, or
  2. unintended or unauthorised call charges or bandwidth charges in excess of normal and usual amounts that you must pay caused by telephone phreaking, or
  3. unintended or unauthorised bandwidth charges and electricity costs in excess of normal and usual amounts that you must pay caused by cryptojacking.

investigation costs means costs you incur with our prior consent, not unreasonably withheld, to investigate and substantiate the circumstances and amount of a socially engineered theft covered under this Optional Cover – Criminal Financial Loss Cover. Investigation costs are included in the limit for Optional Cover – Criminal Financial Loss.

You must report the cyber theft, socially engineered theft, identity-based theft, telephone phreaking or cryptojacking to, respectively, the Australian Cyber Security Centre, your financial institution and your telephone service provider, within 24 hours of it first being discovered by you.

The sublimit for any claim or series of related claims for socially engineered theft is stated in your schedule. The maximum limit we will pay for all direct financial loss under this Optional Cover – Criminal Financial Loss is stated in your schedule.

OPTIONAL COVER - Contingent Business Interruption

We will pay you impact on business costs caused by:

  1. supplier outage, or
  2. system failure.

For the purpose of this Optional Cover – Contingent Business Interruption Cover only the words listed below have been given a specific meaning and the specific meanings apply:

cyber event is extended to include a cyber event at your direct external supplier’s business.

impact on business costs means:

  1. the amount that the revenue you earn during the indemnity period falls short of the revenue you ordinarily earn directly as a result of a supplier outage or a system failure, less any consequent savings, and
  2. the net increased costs incurred to avoid a reduction in revenue directly as a result of the interruption to your business provided the amount of increased costs paid is less than we would have paid for a reduction in standard revenue in a. above. Net increased costs do not include your ongoing normal operating expenses, salaries or overhead expenses.

The amount is calculated by reference to the records of your business and any other documents that we reasonably request. Impact on business costs does not include cyber event response costs. We will not pay any impact on business costs incurred under this Optional Cover – Contingent Business Interruption Cover during the waiting period of three days (72 hours) after the first interruption to your business.

indemnity period is amended and means the continuous period starting from the first interruption to your business until:

  1. supply from your direct external supplier resumes, or until you have a substitute supply (in the case of supplier outage), or
  2. the outage is sufficiently restored to support your usual business operations (in the case of system failure) plus reasonable additional time to allow your business and revenue to normalise. The indemnity period shall not exceed a total length of 35 days.

supplier outage means an interruption to your business directly arising from an outage at your direct external suppliers’ business, where, in our reasonable opinion, the outage has been caused by a cyber event at your direct external supplier’s business.

system failure means an interruption to your business directly arising from an unintentional, unexpected and unplanned outage of your IT infrastructure or IT infrastructure under the direct control of your IT contractor, but does not include outage:

  1. caused by a cyber event;
  2. caused by using untested, disapproved or illegal software, or software that is past its end-of-life and no longer supported;
  3. caused by use of a non-operational part of your IT infrastructure;
  4. falling within parameters of a service level agreement;
  5. arising out of commercial dispute, failure to pay for services or refusal to deliver services paid for; or
  6. arising out of physical cause or natural peril, such as fire, wind, water, flood, lightning, explosion, collision, subsidence, earthquake, or any other act of God.

The maximum limit we will pay under this Optional Cover – Contingent Business Interruption Cover is $250,000 unless another amount is stated in your schedule.

Joint Ventures/Consortiums

The cover provided under Section B – Loss To Others section of this policy is extended to your participation in a joint venture or consortium you have declared to us.

This Optional Cover – Joint Venture And Consortium Cover applies only if you have declared to us the estimated total revenue to be received from the joint venture or consortium for the coming 12 month period and the joint venture or consortium is named in your schedule.

This Optional Cover covers you only. No other participant in such joint venture or consortium, and no other third party, has any rights under this policy, nor shall we be liable to pay a contribution to any insurer of any other participant in such joint venture or consortium.

Section F – Exclusion 21 of the policy is varied to the extent of this Optional Cover – Joint Venture And Consortium Cover.

Tangible Property

We will pay the cost of the replacement or repair of your IT hardware that is physically damaged or no longer suitable for use solely and directly because of a cyber event covered under this policy or the incurring of related cyber event response costs.

Section F – Exclusion 1 of the policy is varied to the extent of this Optional Cover – Tangible Property Cover.

Criminal Financial Loss

We will pay a direct financial loss to you or a direct financial loss to others directly arising out of:

  1. cyber theft;
  2. socially engineered theft;
  3. identity-based theft;
  4. telephone phreaking; or
  5. cryptojacking

that is first discovered by you and notified to us in the policy period.

Section F – Exclusion 19 of the policy is varied to the extent of this Optional Cover – Criminal Financial Loss Cover.

For the purposes of this Optional Cover – Criminal Financial Loss Cover only, we will pay pursuit costs of up to a maximum of $50,000 paid with our agreement and consent to a third party (other than a law enforcement officer or your current or former employee or IT contractor), as reward for assistance leading to the arrest and conviction of the perpetrator of a cyber theft, socially engineered theft, identity-based theft, telephone phreaking or cryptojacking.

For the purposes of this Optional Cover – Criminal Financial Loss Cover only, the words listed below have been given a specific meaning and these specific meanings apply:

direct financial loss means

  1. your funds, accounts receivable or securities, or the funds, accounts receivable or securities in your control belonging to others, that are lost due to cyber theft, identity-based theft or socially engineered theft and remain unrecoverable, or
  2. unintended or unauthorised call charges or bandwidth charges in excess of normal and usual amounts that you must pay caused by telephone phreaking, or
  3. unintended or unauthorised bandwidth charges and electricity costs in excess of normal and usual amounts that you must pay caused by cryptojacking.

investigation costs means costs you incur with our prior consent, not unreasonably withheld, to investigate and substantiate the circumstances and amount of a socially engineered theft covered under this Optional Cover – Criminal Financial Loss Cover. Investigation costs are included in the limit for Optional Cover – Criminal Financial Loss.

You must report the cyber theft, socially engineered theft, identity-based theft, telephone phreaking or cryptojacking to, respectively, the Australian Cyber Security Centre, your financial institution and your telephone service provider, within 24 hours of it first being discovered by you.

The sublimit for any claim or series of related claims for socially engineered theft is stated in your schedule. The maximum limit we will pay for all direct financial loss under this Optional Cover – Criminal Financial Loss is stated in your schedule.

Contingent Business Interruption

We will pay you impact on business costs caused by:

  1. supplier outage, or
  2. system failure.

For the purpose of this Optional Cover – Contingent Business Interruption Cover only the words listed below have been given a specific meaning and the specific meanings apply:

cyber event is extended to include a cyber event at your direct external supplier’s business.

impact on business costs means:

  1. the amount that the revenue you earn during the indemnity period falls short of the revenue you ordinarily earn directly as a result of a supplier outage or a system failure, less any consequent savings, and
  2. the net increased costs incurred to avoid a reduction in revenue directly as a result of the interruption to your business provided the amount of increased costs paid is less than we would have paid for a reduction in standard revenue in a. above. Net increased costs do not include your ongoing normal operating expenses, salaries or overhead expenses.

The amount is calculated by reference to the records of your business and any other documents that we reasonably request. Impact on business costs does not include cyber event response costs. We will not pay any impact on business costs incurred under this Optional Cover – Contingent Business Interruption Cover during the waiting period of three days (72 hours) after the first interruption to your business.

indemnity period is amended and means the continuous period starting from the first interruption to your business until:

  1. supply from your direct external supplier resumes, or until you have a substitute supply (in the case of supplier outage), or
  2. the outage is sufficiently restored to support your usual business operations (in the case of system failure) plus reasonable additional time to allow your business and revenue to normalise. The indemnity period shall not exceed a total length of 35 days.

supplier outage means an interruption to your business directly arising from an outage at your direct external suppliers’ business, where, in our reasonable opinion, the outage has been caused by a cyber event at your direct external supplier’s business.

system failure means an interruption to your business directly arising from an unintentional, unexpected and unplanned outage of your IT infrastructure or IT infrastructure under the direct control of your IT contractor, but does not include outage:

  1. caused by a cyber event;
  2. caused by using untested, disapproved or illegal software, or software that is past its end-of-life and no longer supported;
  3. caused by use of a non-operational part of your IT infrastructure;
  4. falling within parameters of a service level agreement;
  5. arising out of commercial dispute, failure to pay for services or refusal to deliver services paid for; or
  6. arising out of physical cause or natural peril, such as fire, wind, water, flood, lightning, explosion, collision, subsidence, earthquake, or any other act of God.

The maximum limit we will pay under this Optional Cover – Contingent Business Interruption Cover is $250,000 unless another amount is stated in your schedule.

Cyber Protect Cyber Protect

Cyber Insurance should be managed by Brokers who know Technology, our expertise is built from years of managing claims for the Technology Industry.

2/35 Ethel Street, Yeerongpilly QLD 4105
(07) 3279 6592

Follow Us

  • Facebook
  • Instagram
  • Linkedin

Hunter Broking Group Pty Ltd (ABN 97 622 090 715) is an Authorised Representative of Resilium Insurance Broking Pty Ltd ABN 92 169 975 973 AFSL No 460382.
“This information does not take into account the objectives, financial situation or needs of any person. Before making a decision, you should consider whether it is appropriate in light of your particular objectives, financial situation or needs.”

We subscribe to and are bound by the Insurance Brokers Code of Practice, a full copy of which is available from the National Insurance Brokers Association (NIBA) website, www.niba.com.au

Disclaimer: The information provided by Hunter Broking Group Pty Ltd on this website is for general information purposes only, and it is not a substitute for professional advice. You should always consider the PDS/Policy wording before making a decision. Coverage may differ based on specific clauses in individual policies.

  • Supporting Vulnerable Persons
  • Privacy Policy
  • Terms & Conditions

Copyright © 2025 Hunter Broking Group Trading As Cyber Protect. All rights reserved.