nDash.co is a content creation platform that provides brands and agencies with access to the world's top freelance writers.

nDash Writer Profile for Todd Hendrickson

Todd Hendrickson


IT Professional

About Me

Specialties: SQL, PHP, XML, HTML, Computer Hardware, Networking, Security, Virtualization, Vendor Management, Purchasing, IT Management, Cisco, Dell, Mobile Application Development, CSS, Node.js, Angular.js, Ethical Hacking, Linux, Project Management, Git, Ruby, C#, mySQL, Javascript

Industries I Write About

Information Technology & Services

Find writers and ideas in this industry

Computer Networking

Find writers and ideas in this industry

Computer Hardware

Find writers and ideas in this industry

Computer Games

Find writers and ideas in this industry

Health, Wellness & Fitness

Find writers and ideas in this industry

My Writing Samples

How to Become GDPR Compliant

How to Become GDPR CompliantThe words General Data Protection Regulation (GDPR) should strike at least a little fear in the hearts of organizations doing business in the European Union. These new regulations are due to come into effect on May 25, and they will impact any business dealing in personal, classified and sensitive data. But what is GDPR, and how should an organization prepare for the new legislation?



Director of IT

As a key member of the senior management team, I am responsible for overseeing the development and implementation of IT strategies, including tactical planning, organization and operation of IT services for the organization, and providing exceptional leadership and direction to IT team members. My responsibilities include: - Oversee and participate in the execution of IT activities and projects in a way to support achievement of organizational goals. - Analyze complex business needs presented by the user community and/or customers and recommends technical solutions. - Stay current with emerging technology trends and regulations, and evaluates possible application for the organization. - Make recommendations when appropriate for execution/inclusion by the organization. As well, design and implement the appropriate technologies to support and improve communications, access to information, and end-user productivity. - Design custom software solutions to support business processes where software packages are not available or suitable and direct these projects to their eventual implementation. - Provides leadership, coaching and development to IT team members (staff and consultants). - Ensure software, hardware and network installs, re-installs, upgrades, moves, changes and relocations are made when necessary and as required. - Oversee the monitoring & optimization of performance, maintenance, back-up, security & recovery of servers, systems & databases. - Proactively identify and recommend opportunities to improve the IT infrastructure of the organization - Partner with senior management in the development and implementation of IT business plan and initiatives. - Provide IT counsel to senior management on an ongoing basis

Company: Private School

I worked there from 9/2012 until now

Content I Write

Ideas and Pitches I Wrote

IOT Threat Models: The Most Common Points of Entry

This article will be a list type article, showing the variety of threat models users can encounter with IOT and how to address the risks.

Content type: Article


3 Steps to Managing Patch Management Risks

This will outline a 3 step process to manage the risk associated with patch management, and ensure that MSP's are targeting the major patches that could affect their clients.

Content type: Blog Post


Lock Down before you get Locked Out

Ransomware continues to evolve alongside the increase in sophistication of cybercriminals methods. There are a number of techniques that can be implemented at the endpoint to lock down the computer, in order to mitigate infection.

Content type: Article


3 Benefits to a Desktop as a Service Solution

Desktop as a Service is no longer in it's infancy and offers distinct, tangible benefits to users and businesses including cost and complexity reduction as well as making risk governance easier. This article will highlight those benefits and how it impacts the business.

Content type: Blog Post

Keywords: DAAS,Desktop as a Service Benefits


Supply Chain Integrity in Industrial Applications

Compromising the hardware at the micro level of the supply chain of industrial components is one of the ways that cybercriminals are successfully attacking the control infrastructure of industrial plants and energy systems. DUST is the perfect solution to create an un-cloneable, trackable supply chain to preserve security. This article shows a fictional attack and how DUST could mitigate it.

Content type: Article