• Process
  • Testimonials
  • Benefits
  • Additional Covers
  • Information
  • Partners
  • Contact Us
admin@hunterbroking.com.au
(07) 3279 6592
Cyber Protect Cyber Protect
  • Process
  • Testimonials
  • Benefits
  • Additional Covers
  • Information
  • Partners
  • Contact Us
  • (07) 3279 6592
 
 

"*" indicates required fields

Step 1 of 7

14%
Please select the appropriate company turnover*
****************************************************
By clicking “Less than $25,000,000″,
I agree that the below applies to my business:

Your estimated revenue is ≤ $25m, and
You’ve requested a policy limit ≤ $5m, and
You haven’t suffered a cyber loss, and
You are not in the IT, internet or telecommunications industry

****************************************************
****************************************************
By clicking “More than $25,000,000″,
I agree that the below applies to my business:

Your estimated revenue is >$25m, or
You’ve requested a policy limit >$5m, or
You’ve previously suffered a cyber loss, or
You are in the IT, internet or telecommunications industry

****************************************************
Were you Referred by an Partner of Cyber Protect?

General

What type of policy holder are you?
Do you perform work for the defence industry or Federal Government or are you a member of the Defence Industry Security Program (DISP)?
Policyholder’s principal address
Website(s) or domain(s) A domain name (often called a domain) is an easyto-remember name that’s associated with a physical IP address on the Internet. It’s the unique name that appears after the @ symbol in email addresses, and after www. in web addresses. Examples of domain names include google.com and wikipedia.org.
Don’t know / don’t have a website, domain or business email
Website(s) or domain(s)
List all domains for ‘smarter cyber’ monitoring or confirm

Please provide the contact details of the person who is responsible for cyber security:

Note: This information will be used to provide critical security updates on a needs basis and will not be used for marketing purposes.
Name

Financials

Estimated revenue for the coming 12 month period by territory:

Are you located in the territory?
Are you located in the territory?
Are you located in the territory?
Are you located in the territory?

Stamp Duty

For calculating stamp duty, outline the breakdown of revenue (000’s) by state/region:
Is the policyholder stamp duty exempt?
If Yes, please provide a copy of the exemption letter.
Accepted file types: jpg, png, pdf, Max. file size: 5 MB.

Data Protection

Do you collect, process, hold or store data on behalf of any 3rd party?
Please state the total number of Personally Identifiable Information (PII) and other sensitive records you collect, process, hold or store in your business, including on behalf of others.
Note: All categories of PII relating to the same individual (whether active or inactive) should only count as a single unique record.
Please select the type of records collected, processed, held or stored:
Customer information (e.g., name, address, email address, phone number etc)
Payment card information
Identity information (e.g., drivers licence, tax file number, passport number etc)
Banking or financial information
Medical or healthcare information
Biometric data
Trade secrets or intellectual property
Do you protect all personally identifiable information and other sensitive data through encryption Encryption is the process of converting information or data into code to prevent unauthorised use. Encryption at rest refers to encrypting data when it is stored on a device or storage system. Encryption in transit refers to encrypting data as it travels across a network or between systems. while:
At rest
In transit
Backed up
Stored on portable devices
Stored with 3rd parties
Do you have the following policies in place?
(tick all that apply)

Governance

How frequently do you provide security awareness training to your employees?
How frequently do you test employees’ security awareness through simulated phishing campaigns?

Asset Security

Do you maintain an inventory of all your hardware and software?

Hardware
Software
Have you implemented secure configurations to all hardware and software assets?

If Yes, please indicate which of the following have been implemented:

Changing and/or disabling default accounts and passwords
Disabling or removing unneeded services, components or features
Implementing vendor specific security recommendations
Enforcing encryption of local storage devices
Enable appropriate backups
Configure logging of system logons, activity, warnings and errors
Sending all logs to a centralised logging server
Assets are onboarded onto EDR and/or SIEM platforms
Have you deployed an Endpoint Detection and Response (EDR) EDR technology focuses on the detection, investigation, and mitigation of suspicious activities on endpoints including computers, servers and other devices within a network. EDR can identify anomalies and identify potential security threats. tool that covers 100% of:
Servers?
Endpoints?
Indicate if AI/automated rules-based enforcement has been enabled:

If EDR has not been deployed or covers less than 90%, indicate what compensatory measures you’ve implemented:

Application whitelisting
Endpoint Protection Platform (EPP)
Next Generation Firewall (NGFW)
Intrusion Detection/Prevention System (IDS/IPS)
Content control software (web/URL filtering)
Have you implemented a critical security patch management process for your IT systems?
If Yes, how do you handle security patches?

Funds Transfer Fraud

Prior to transferring any funds: 
Are all names, addresses, sort codes, account names and bank account numbers checked by the administrator / account manager at the Insured?  
Is a written / digital contemporaneous record kept confirming the details held on the Insured’s internal records and validated by the client are the same as those being used? 
After the payment form has been completed, signed and dated by the administrator / account manager, is it then double checked, signed and dated by a supervisor before transferring funds? 

Email Security

Do you use an email filtration and scanning tool to authenticate emails and flag and quarantine suspicious content (e.g., executable files)?

Identity and Access Management

Is Multi-Factor Authentication (MFA*) MFA is a mechanism that requires individuals to provide more than one form of identification to access an account or system. The additional forms of identification can include one-time codes or biometrics. required for all users to access the following systems/platforms/services?
All remote access to the network?
Web-based email?
Admin/privilege service accounts?
Cloud resources, including back ups?
*Note: To qualify as multi-factor authentication, the authentication mechanism needs to be knowledge (something the user and only the user knows) and possession (something the user and only the user has). That way the compromise of any single device will only compromise a single authentication factor.

Assessments

In the last 12 months have you had any of the following conducted on your business/systems?
Penetration test
Vulnerability scan
Payment Card Industry (PCI) assessment
External IT audit

End of Life Technology

Do you rely on any operating system, software or hardware that is no longer supported or is considered end of life by the manufacturer?
If Yes, please answer the following questions:
Is any end of life technology internet facing?
Is it segregated from the rest of the network?
Has additional support been purchased where available?

Resiliency and Recovery

How frequently do you take regular backups of critical data and systems?
Do you keep a copy of critical backups offline, segregated from and inaccessible to your network?
Is your backup environment:
In the cloud
On premises
At a secondary, offsite data centre
Encrypted
MFA protected
Using immutable technology
How frequently do you test system restoration capabilities by performing a full restoration from a sample set of backup data?
Please confirm which of the following formal plans you have in place (which addresses cyber incidents) and whether tested at least annually:
Disaster Recovery Plan (DRP)
In place?
Tested annually?
Business Continuity Plan (BCP)
In place?
Tested annually?
Incident Response Plan (IRP)
In place?
Tested annually?
Does your IRP specifically address ransomware scenarios?

Prior Claims and Circumstances

After enquiry, within the past 5 years, are you aware of any losses, claims, circumstances, cyber events, privacy breaches, regulatory investigations, crime or social engineering incidents which have impacted, or could adversely impact your business or give rise to a claim under a cyber policy?
MM slash DD slash YYYY
Please indicate the nature of the loss by ticking the appropriate box:
Accepted file types: jpg, png, pdf, Max. file size: 5 MB.
Have you had any unforeseen down time to your website or IT network of more than 8 hours?
Add another claim

MM slash DD slash YYYY
Please indicate the nature of the loss by ticking the appropriate box:
Accepted file types: jpg, png, pdf, Max. file size: 5 MB.
Have you had any unforeseen down time to your website or IT network of more than 8 hours?
Add another claim

MM slash DD slash YYYY
Please indicate the nature of the loss by ticking the appropriate box:
Accepted file types: jpg, png, pdf, Max. file size: 5 MB.
Have you had any unforeseen down time to your website or IT network of more than 8 hours?

Optional Cover – Non-IT Contingent Business Interruption and System Failure

Do you want Optional Cover for Non-IT Contingent Business Interruption and System Failure?
Tell us about your critical components, service providers and supplies.

Optional Cover – Criminal Financial Loss

Do you want Optional Cover for Criminal Financial Loss?
Includes cyber theft, telephone phreaking, identity-based theft, push payment theft and cryptojacking. Does not include socially engineered theft unless selected below.
Aggregate limit for Criminal Financial Loss
Excess applicable to Criminal Financial Loss only
Do you want to include cover for socially engineered theft?
Sublimit for socially engineered theft
The sublimit for socially engineered theft is included within and cannot be greater than the aggregate limit for criminal financial loss. The excess for criminal financial loss applies to socially engineered theft as well.
Are all new payees, and changes to existing payees’ banking details, double authenticated with the payee?
Do transfers > $10,000 require dual signature or supervisor / manager sign off?
After enquiry, have you within the past 5 years suffered a crime, fidelity or computer crime loss?

Optional Cover – D&O Liability

Do you want Optional Cover for Directors & Officers Liability?
D&O Liability is only available for unlisted companies.
Aggregate sublimit for D&O Liability
The sublimit for D&O Liability is included within and cannot be greater than the policy aggregate limit.
Are you listed on any stock exchange, or are you planning an initial public offering or any subsequent offering during the coming 12 months?
Have you within the past 5 years had D&O or Management Liability (ML) insurance declined or cancelled, or are you aware, after enquiry, of any D&O or ML loss, claim, or circumstance which has or could impact you or your business or give rise to a D&O or ML claim?

Optional Cover – Tangible Property

Do you want Optional Cover for Tangible Property?
The Tangible Property sublimit forms part of and is not in addition to the limit for Section C – Cyber Event Response Costs.

Optional Cover – Joint Venture and Consortium Cover

Do you want Optional Cover for your liability from joint ventures or consortia?
Note: You must also include your share of revenue from the JV or consortium for the coming 12 months in your estimated total revenue.

Trading Names, Subsidiaries and Affiliates

If you wish to list trading names, please list them individually in the boxes provided below.
If you wish to list subsidiaries, please list them individually in the boxes provided below.
Note: Subsidiaries of the policyholder are automatically covered and do not require scheduling. Listing an entity here does not extend cover or affect cover in any way. This list is for your convenience only.
Do you require cover for affiliated companies?
If Yes, please list the affiliates and revenue below and tell us how you are affiliated and about the IT.
Note: Listing an entity here means you are submitting it to Emergence for consideration. Cover will only apply to those entities accepted by Emergence and scheduled on the policy. You must provide revenue estimates for each entity and include revenue from all affiliates for the coming 12 months in your total estimated revenue.
Nature of affiliation
Is this affiliate’s IT fully separate and independent?
Affiliate2
Nature of affiliation
Is this affiliate’s IT fully separate and independent?

Please Specify your preferred excess, indemnity period and asset limit

Excess
Section A indemnity period (duration you can claim business interruption for)
Policy aggregate limit

Declaration

I/we acknowledge that*
Acknowledgement*
Acknowledgement*
Acknowledgement*
Clear Signature
 

We specialize in providing customized IT Support Solutions to small and medium sized organisations. We understand that technology is a critical component of your business, and our mission is to ensure that your systems are running efficiently and effectively at all times. Blackguard was born out of the enormous increase of cyber fraud, malicious activity and other nefarious cyber threats since the rise of cloud applications and platforms such as Office 365. We recognised that existing IT Support companies simply weren’t equipped or had the expertise to protect modern day companies that rely on the cloud. We are a Brisbane based IT company who’s mission is simple:

Provide exceptional IT Support while protecting our customer’s data at all times.

Our Services:

Black Ink Legal

Commercial

  • 1-Page NDA
  • Confidentiality Agreement
  • Deed of Amendment
  • Deed of Guarantee
  • Deed of Novation
  • Deed of Termination and Release
  • Services Agreement for a Single Client
  • Terms of Business for Services
  • Data Protection Policy

Website Documents

  • Privacy Policy
  • Website Returns Policy
  • Website Terms of Use

Company Secretarial

  • Adoption or replacement of constitution (shareholder approvals package)
  • Appointment of company officers (director approvals package)
  • Change of company name (shareholder approvals package)
  • Constitution – proprietary company limited by shares
  • Deed of Access and Indemnity
  • Execution of documents (director approvals package)
  • Power of Attorney – execution of documents
  • Resignation of company officers (director approvals package)

Corporate

  • Business Sale Agreement
  • Shareholders’ or Unitholders’ Deed

Dispute Resolution

  • Deed of Settlement and Release

Finance

  • Loan or Loan Facility Agreement

Intellectual Property

  • Deed of Assignment of IP
  • IP Licence Agreement

Legal Health Check

  • Legal Health Check

Property

  • Commercial Lease (non-retail)
  • Transfer of Lease

Trusts

  • Family Trust Deed
  • Unit Trust Deed

Entag is an innovative and solution-focused technology partner with a consultative approach to design, delivery, and support of strategic ICT solutions. Collaboration, productivity, and security are the core focus of transitioning our clients to future ways of working. To achieve this, we adopt and value a technology mix consisting of software as a service, cloud compute, mobile applications, and cloud communications, along with offering a range of managed services to provide ongoing support in these areas.

We are a regional QLD based organisation, with our head office in Birtinya on the Sunshine Coast and offices in Brisbane. As such, we have a good understanding of the challenges faced in regional areas and have a history of success across various industries at all levels in both regional and metropolitan areas. We believe it is crucial that end user support can be provided regardless of location and operate providing full end to end Managed Services.

As businesses increasingly leverage mobile data and cloud computing technologies, we focus on enabling end users to work securely from anywhere with access to a device and internet connection. Entag provides best of breed business and technology solutions, with proactive recommendations by our dedicated team of Business and Technology Consultants, Account Managers, Solution Architects, experienced Project Managers, and service delivery specialists.

Our end-to-end delivery and managed services enhance your business’s ability to implement new technology while reducing the traditional inhouse management costs. We continually employ new technology in-house and we consult with clients leveraging our knowledge of their existing environment to design and deliver tailored solutions and the right technologies.

Awarded Telstra QLD Enterprise Partner of the Year for 2021 and 2022, Entag partner with Telstra, Cisco, Microsoft, Ubiquiti and Cradlepoint to provide cloud first network solutions for our customers. We are a Certified Gold Partner with Telstra for collaboration, delivering a range of digital calling solutions and provide full suite of managed services to support and maximise your technology investment.

  • Tier 1 Integrated Mobile and Data Networks • Cloud Phone System & Collaboration Platforms (TIPT & Telstra Calling for Office 365) Unique End to End Managed Services Offering • Mobile and Cloud first strategy & access to Technology Funding via Telstra Telstra Certifications (Platinum being the highest)
  • Networks (Data & IP) [Platinum]
  • Cloud [Gold]
  • Mobility [Gold]
  • Collaboration (TIPT) [Gold] Microsoft Gold Partner
  • Cloud Platform [Gold] • Cloud Productivity [Gold]
  • Small & Mid-Market Cloud Solutions [Gold] • Windows & Devices [Gold]
  • Collaboration & Content [Silver] • Communications [Silver]
  • Enterprise Mobility Management [Silver] Certifications Cisco Meraki and Microsoft Our Managed ICT team hold current Cisco Meraki Network Associate (CCNA) accreditation and we have Microsoft certifications in the following categories
  • Cloud Productivity MS-100
  • Communications MS-700
  • Project & Portfolio Management MS-700
  • Collaboration & Content MS-700
  • Cloud Platform AZ-104
  • Security MS-500 & AZ-500
  • Enterprise Mobility Management MS-100 & MS-101 For further detail

Our Purpose, Culture and Community Our Purpose: Creating future ready careers for our people and innovative tech solutions for our customers.

Our Vision: “To make technology meaningful for our customers”

OPTIONAL COVER - Joint Venture and Consortium Cover

The cover provided under Section B – Loss To Others section of this policy is extended to your participation in a joint venture or consortium you have declared to us.

This Optional Cover – Joint Venture And Consortium Cover applies only if you have declared to us the estimated total revenue to be received from the joint venture or consortium for the coming 12 month period and the joint venture or consortium is named in your schedule.

This Optional Cover covers you only. No other participant in such joint venture or consortium, and no other third party, has any rights under this policy, nor shall we be liable to pay a contribution to any insurer of any other participant in such joint venture or consortium.

Section F – Exclusion 21 of the policy is varied to the extent of this Optional Cover – Joint Venture And Consortium Cover.

OPTIONAL COVER - Tangible Property

We will pay the cost of the replacement or repair of your IT hardware that is physically damaged or no longer suitable for use solely and directly because of a cyber event covered under this policy or the incurring of related cyber event response costs.

Section F – Exclusion 1 of the policy is varied to the extent of this Optional Cover – Tangible Property Cover.

OPTIONAL COVER - Criminal Financial Loss

We will pay a direct financial loss to you or a direct financial loss to others directly arising out of:

  1. cyber theft;
  2. socially engineered theft;
  3. identity-based theft;
  4. telephone phreaking; or
  5. cryptojacking

that is first discovered by you and notified to us in the policy period.

Section F – Exclusion 19 of the policy is varied to the extent of this Optional Cover – Criminal Financial Loss Cover.

For the purposes of this Optional Cover – Criminal Financial Loss Cover only, we will pay pursuit costs of up to a maximum of $50,000 paid with our agreement and consent to a third party (other than a law enforcement officer or your current or former employee or IT contractor), as reward for assistance leading to the arrest and conviction of the perpetrator of a cyber theft, socially engineered theft, identity-based theft, telephone phreaking or cryptojacking.

For the purposes of this Optional Cover – Criminal Financial Loss Cover only, the words listed below have been given a specific meaning and these specific meanings apply:

direct financial loss means

  1. your funds, accounts receivable or securities, or the funds, accounts receivable or securities in your control belonging to others, that are lost due to cyber theft, identity-based theft or socially engineered theft and remain unrecoverable, or
  2. unintended or unauthorised call charges or bandwidth charges in excess of normal and usual amounts that you must pay caused by telephone phreaking, or
  3. unintended or unauthorised bandwidth charges and electricity costs in excess of normal and usual amounts that you must pay caused by cryptojacking.

investigation costs means costs you incur with our prior consent, not unreasonably withheld, to investigate and substantiate the circumstances and amount of a socially engineered theft covered under this Optional Cover – Criminal Financial Loss Cover. Investigation costs are included in the limit for Optional Cover – Criminal Financial Loss.

You must report the cyber theft, socially engineered theft, identity-based theft, telephone phreaking or cryptojacking to, respectively, the Australian Cyber Security Centre, your financial institution and your telephone service provider, within 24 hours of it first being discovered by you.

The sublimit for any claim or series of related claims for socially engineered theft is stated in your schedule. The maximum limit we will pay for all direct financial loss under this Optional Cover – Criminal Financial Loss is stated in your schedule.

OPTIONAL COVER - Contingent Business Interruption

We will pay you impact on business costs caused by:

  1. supplier outage, or
  2. system failure.

For the purpose of this Optional Cover – Contingent Business Interruption Cover only the words listed below have been given a specific meaning and the specific meanings apply:

cyber event is extended to include a cyber event at your direct external supplier’s business.

impact on business costs means:

  1. the amount that the revenue you earn during the indemnity period falls short of the revenue you ordinarily earn directly as a result of a supplier outage or a system failure, less any consequent savings, and
  2. the net increased costs incurred to avoid a reduction in revenue directly as a result of the interruption to your business provided the amount of increased costs paid is less than we would have paid for a reduction in standard revenue in a. above. Net increased costs do not include your ongoing normal operating expenses, salaries or overhead expenses.

The amount is calculated by reference to the records of your business and any other documents that we reasonably request. Impact on business costs does not include cyber event response costs. We will not pay any impact on business costs incurred under this Optional Cover – Contingent Business Interruption Cover during the waiting period of three days (72 hours) after the first interruption to your business.

indemnity period is amended and means the continuous period starting from the first interruption to your business until:

  1. supply from your direct external supplier resumes, or until you have a substitute supply (in the case of supplier outage), or
  2. the outage is sufficiently restored to support your usual business operations (in the case of system failure) plus reasonable additional time to allow your business and revenue to normalise. The indemnity period shall not exceed a total length of 35 days.

supplier outage means an interruption to your business directly arising from an outage at your direct external suppliers’ business, where, in our reasonable opinion, the outage has been caused by a cyber event at your direct external supplier’s business.

system failure means an interruption to your business directly arising from an unintentional, unexpected and unplanned outage of your IT infrastructure or IT infrastructure under the direct control of your IT contractor, but does not include outage:

  1. caused by a cyber event;
  2. caused by using untested, disapproved or illegal software, or software that is past its end-of-life and no longer supported;
  3. caused by use of a non-operational part of your IT infrastructure;
  4. falling within parameters of a service level agreement;
  5. arising out of commercial dispute, failure to pay for services or refusal to deliver services paid for; or
  6. arising out of physical cause or natural peril, such as fire, wind, water, flood, lightning, explosion, collision, subsidence, earthquake, or any other act of God.

The maximum limit we will pay under this Optional Cover – Contingent Business Interruption Cover is $250,000 unless another amount is stated in your schedule.

Joint Ventures/Consortiums

The cover provided under Section B – Loss To Others section of this policy is extended to your participation in a joint venture or consortium you have declared to us.

This Optional Cover – Joint Venture And Consortium Cover applies only if you have declared to us the estimated total revenue to be received from the joint venture or consortium for the coming 12 month period and the joint venture or consortium is named in your schedule.

This Optional Cover covers you only. No other participant in such joint venture or consortium, and no other third party, has any rights under this policy, nor shall we be liable to pay a contribution to any insurer of any other participant in such joint venture or consortium.

Section F – Exclusion 21 of the policy is varied to the extent of this Optional Cover – Joint Venture And Consortium Cover.

Tangible Property

We will pay the cost of the replacement or repair of your IT hardware that is physically damaged or no longer suitable for use solely and directly because of a cyber event covered under this policy or the incurring of related cyber event response costs.

Section F – Exclusion 1 of the policy is varied to the extent of this Optional Cover – Tangible Property Cover.

Criminal Financial Loss

We will pay a direct financial loss to you or a direct financial loss to others directly arising out of:

  1. cyber theft;
  2. socially engineered theft;
  3. identity-based theft;
  4. telephone phreaking; or
  5. cryptojacking

that is first discovered by you and notified to us in the policy period.

Section F – Exclusion 19 of the policy is varied to the extent of this Optional Cover – Criminal Financial Loss Cover.

For the purposes of this Optional Cover – Criminal Financial Loss Cover only, we will pay pursuit costs of up to a maximum of $50,000 paid with our agreement and consent to a third party (other than a law enforcement officer or your current or former employee or IT contractor), as reward for assistance leading to the arrest and conviction of the perpetrator of a cyber theft, socially engineered theft, identity-based theft, telephone phreaking or cryptojacking.

For the purposes of this Optional Cover – Criminal Financial Loss Cover only, the words listed below have been given a specific meaning and these specific meanings apply:

direct financial loss means

  1. your funds, accounts receivable or securities, or the funds, accounts receivable or securities in your control belonging to others, that are lost due to cyber theft, identity-based theft or socially engineered theft and remain unrecoverable, or
  2. unintended or unauthorised call charges or bandwidth charges in excess of normal and usual amounts that you must pay caused by telephone phreaking, or
  3. unintended or unauthorised bandwidth charges and electricity costs in excess of normal and usual amounts that you must pay caused by cryptojacking.

investigation costs means costs you incur with our prior consent, not unreasonably withheld, to investigate and substantiate the circumstances and amount of a socially engineered theft covered under this Optional Cover – Criminal Financial Loss Cover. Investigation costs are included in the limit for Optional Cover – Criminal Financial Loss.

You must report the cyber theft, socially engineered theft, identity-based theft, telephone phreaking or cryptojacking to, respectively, the Australian Cyber Security Centre, your financial institution and your telephone service provider, within 24 hours of it first being discovered by you.

The sublimit for any claim or series of related claims for socially engineered theft is stated in your schedule. The maximum limit we will pay for all direct financial loss under this Optional Cover – Criminal Financial Loss is stated in your schedule.

Contingent Business Interruption

We will pay you impact on business costs caused by:

  1. supplier outage, or
  2. system failure.

For the purpose of this Optional Cover – Contingent Business Interruption Cover only the words listed below have been given a specific meaning and the specific meanings apply:

cyber event is extended to include a cyber event at your direct external supplier’s business.

impact on business costs means:

  1. the amount that the revenue you earn during the indemnity period falls short of the revenue you ordinarily earn directly as a result of a supplier outage or a system failure, less any consequent savings, and
  2. the net increased costs incurred to avoid a reduction in revenue directly as a result of the interruption to your business provided the amount of increased costs paid is less than we would have paid for a reduction in standard revenue in a. above. Net increased costs do not include your ongoing normal operating expenses, salaries or overhead expenses.

The amount is calculated by reference to the records of your business and any other documents that we reasonably request. Impact on business costs does not include cyber event response costs. We will not pay any impact on business costs incurred under this Optional Cover – Contingent Business Interruption Cover during the waiting period of three days (72 hours) after the first interruption to your business.

indemnity period is amended and means the continuous period starting from the first interruption to your business until:

  1. supply from your direct external supplier resumes, or until you have a substitute supply (in the case of supplier outage), or
  2. the outage is sufficiently restored to support your usual business operations (in the case of system failure) plus reasonable additional time to allow your business and revenue to normalise. The indemnity period shall not exceed a total length of 35 days.

supplier outage means an interruption to your business directly arising from an outage at your direct external suppliers’ business, where, in our reasonable opinion, the outage has been caused by a cyber event at your direct external supplier’s business.

system failure means an interruption to your business directly arising from an unintentional, unexpected and unplanned outage of your IT infrastructure or IT infrastructure under the direct control of your IT contractor, but does not include outage:

  1. caused by a cyber event;
  2. caused by using untested, disapproved or illegal software, or software that is past its end-of-life and no longer supported;
  3. caused by use of a non-operational part of your IT infrastructure;
  4. falling within parameters of a service level agreement;
  5. arising out of commercial dispute, failure to pay for services or refusal to deliver services paid for; or
  6. arising out of physical cause or natural peril, such as fire, wind, water, flood, lightning, explosion, collision, subsidence, earthquake, or any other act of God.

The maximum limit we will pay under this Optional Cover – Contingent Business Interruption Cover is $250,000 unless another amount is stated in your schedule.

Cyber Protect Cyber Protect

Cyber Insurance should be managed by Brokers who know Technology, our expertise is built from years of managing claims for the Technology Industry.

2/35 Ethel Street, Yeerongpilly QLD 4105
(07) 3279 6592

Follow Us

  • Facebook
  • Instagram
  • Linkedin

Hunter Broking Group Pty Ltd (ABN 97 622 090 715) is an Authorised Representative of Resilium Insurance Broking Pty Ltd ABN 92 169 975 973 AFSL No 460382.
“This information does not take into account the objectives, financial situation or needs of any person. Before making a decision, you should consider whether it is appropriate in light of your particular objectives, financial situation or needs.”

We subscribe to and are bound by the Insurance Brokers Code of Practice, a full copy of which is available from the National Insurance Brokers Association (NIBA) website, www.niba.com.au

Disclaimer: The information provided by Hunter Broking Group Pty Ltd on this website is for general information purposes only, and it is not a substitute for professional advice. You should always consider the PDS/Policy wording before making a decision. Coverage may differ based on specific clauses in individual policies.

  • Supporting Vulnerable Persons
  • Privacy Policy
  • Terms & Conditions

Copyright © 2025 Hunter Broking Group Trading As Cyber Protect. All rights reserved.