// Guides & Downloads

Practical IT & Security
Resources

Checklists, templates and guides for IT security and compliance — Kenya and Australia. Free to use. No email required.

// Sales & Engagement Documents
📋
Client Tool

IT & Security Health Check

A 3-page client-ready assessment document. Use this after a discovery call or attach it to follow-up emails. Covers system overview, risk findings and recommendations. Print-ready, branded.

Open Health Check →
💰
Pricing Guide

Service Packages & Pricing

Two-page overview of De4sec service packages — Starter, Growth and Advanced — plus add-on services with pricing. Use in proposals and sales conversations.

Open Pricing Guide →
📄
Proposal

Proposal Template

A clean two-page proposal template. Covers client overview, issues identified, recommended solution, investment table, timeline and signature block. Print-ready, branded.

Open Template →
// 🇦🇺 Australia — Compliance & Security Guides
🔐
🇦🇺 Australia

Essential Eight Checklist — ML1

A practical checklist of all eight controls at Maturity Level 1. Use this to self-assess your current posture or prepare for an insurer's questionnaire. Maps each control to the implementation approach.

Read the Guide →
🔄
🇦🇺 Australia

Zero-Downtime Patching Guide

How to implement a structured patch management programme without disrupting business operations. Covers Intune policy setup, staging rings, out-of-hours scheduling and compliance reporting.

Read the Guide →
// 🇰🇪 Kenya — IT & Compliance Guides
🛡️
🇰🇪 Kenya

KDPA Compliance Checklist

What Kenyan businesses need to do to comply with the Kenya Data Protection Act. Covers ODPC registration, privacy policy requirements, data mapping, breach response and technical controls.

Read the Guide →
📱
🇰🇪 Kenya

M-Pesa Integration Security Review

The common vulnerabilities in Daraja API integrations and how to fix them. Covers credential management, webhook validation, reconciliation and fraud detection setup.

Read the Guide →
// NEED SOMETHING MORE SPECIFIC?

Book a free IT & security check.

We review your actual environment and tell you exactly what to fix — not a generic checklist.

Book a Free Discovery Call →
// FREE DOWNLOADS

22 Cybersecurity & IT Guides

Open in your browser and print to PDF. Fully branded, print-ready reference guides for your business.

🇦🇺 Australia

Essential Eight Simplified Guide

Plain-language guide to ASD Essential Eight controls and Maturity Level 1 compliance.

Download Guide →
🇦🇺 Australia

Cyber Insurance Readiness Guide

What insurers require in 2026 — controls, evidence packages, and common claim gaps.

Download Guide →
🇦🇺 Australia

Azure Cloud Security Guide

Securing Azure environments — identity, Defender for Cloud, Sentinel, and workload protection.

Download Guide →
🇦🇺 Australia

Microsoft 365 Security Guide

Securing your M365 tenant — identity, email, devices, DLP, and compliance configuration.

Download Guide →
🌍 AU + KE

Small Business Secure IT Setup Checklist

Complete setup checklist — identity, devices, network, backup, and monitoring from day one.

Download Guide →
🌍 AU + KE

Ransomware Incident Response Guide

Step-by-step guide for the first 72 hours of a ransomware incident.

Download Guide →
🌍 AU + KE

Backup and Disaster Recovery Guide

3-2-1 backup design, immutable storage, RTO/RPO, and Microsoft 365 backup requirements.

Download Guide →
🌍 AU + KE

Zero Trust Security Guide

Identity-first Zero Trust — Conditional Access, device compliance, and data protection.

Download Guide →
🌍 AU + KE

Endpoint Security Guide

Deploying and managing Microsoft Defender for Endpoint — EDR, ASR rules, and monitoring.

Download Guide →
🌍 AU + KE

Phishing Protection Guide

Email authentication, Defender for Office 365, and defending against BEC.

Download Guide →
🌍 AU + KE

Email Security Guide

SPF, DKIM, DMARC, Safe Links, Safe Attachments, and BEC prevention.

Download Guide →
🌍 AU + KE

SOC & SIEM Monitoring Guide

Microsoft Sentinel, 24/7 monitoring, alert triage, and managed SOC for SMBs.

Download Guide →
🌍 AU + KE

Ransomware Defence Guide

Prevention, detection, containment, and recovery — the full ransomware defence lifecycle.

Download Guide →
🌍 AU + KE

AWS Cloud Security Guide

IAM, GuardDuty, Security Hub, CloudTrail, and workload security for AWS environments.

Download Guide →
🌍 AU + KE

Hybrid Cloud Infrastructure Guide

Unified identity, secure connectivity, and monitoring across on-premise and cloud.

Download Guide →
🌍 AU + KE

Microsoft Defender Business Protection

The full Defender XDR ecosystem — Endpoint, Office 365, Identity, and Cloud Apps.

Download Guide →
🌍 AU + KE

On-Premise Infrastructure Security Guide

Active Directory hardening, patch management, network security, and physical controls.

Download Guide →
🌍 AU + KE

Cyber Incident Response Guide

Six-phase IR planning, tabletop exercises, legal obligations, and De4sec IR support.

Download Guide →
🌍 AU + KE

POS Security and Deployment Guide

Network segmentation, endpoint hardening, access control, and PCI DSS for retail and hospitality.

Download Guide →
🌍 AU + KE

Password Security Guide

MFA, passkeys, enterprise password management, and the end of password complexity policies.

Download Guide →
🌍 AU + KE

Managed IT Services Guide

What proactive managed IT covers and why it costs less than reactive break-fix IT.

Download Guide →
🌍 AU + KE

Data Protection & DLP Guide

Sensitivity labels, DLP policies, Microsoft Purview, retention, and regulatory compliance.

Download Guide →