Welcome to the First Column IT Tech Blog

HomeBlog
Cybersecurity Lessons From an NFL Draft Day Prank

Cybersecurity Lessons From an NFL Draft Day Prank

May 14, 2025

Sometimes, a real-world event vividly illustrates the importance of digital security basics. The recent NFL draft provided just such a case, involving an unlocked iPad, a prank call, and significant consequences.

The story centers around Shedeur Sanders, a highly anticipated draft prospect, and Jeff Ulbrich, the Atlanta Falcons' Defensive Coordinator. To maintain security during the draft, prospects use special phone numbers known only to NFL teams. Ulbrich had this sensitive contact list stored on his iPad.

Days before the draft, Ulbrich's son, Jax, used the unlocked iPad, discovered Sanders' private number, and recorded it. On draft day, Jax and a friend used the number to prank Sanders, posing as the New Orleans Saints GM, claiming they were about to draft him. This prank came as Sanders experienced a draft-day slide, falling from a projected first-round pick to the 144th selection; in the fifth round.

The incident didn't stay private. Video emerged, leading to Jax Ulbrich issuing a public apology. More tangibly, the NFL fined Jeff Ulbrich $100,000 and the Falcons organization $250,000 for the security lapse. Beyond the fines, the event potentially cost Sanders millions (the salary difference between early and later picks is vast) and undoubtedly created trust issues within the Falcons organization.

Lessons Beyond the Gridiron

There are lessons here that are relevant for any business; not just billion-dollar sports franchises. What can you learn from this NFL fumble? Here are a few things: 

  • The imperative of authentication - An unlocked device containing sensitive information was the root cause. Every phone, tablet, and computer, particularly those used for work, needs robust password protection or other authentication methods.
  • Access control matters - The NFL's system of secret numbers aimed for limited access. However, that sensitive data wasn't secured on the coordinator's device. Businesses must ensure data access is restricted and protected wherever it's stored or accessed.
  • Recognizing deception - The prank call, using impersonation for deceptive purposes, is functionally similar to a phishing attack. It's a potent reminder to treat unexpected communications with caution and verify requests through established channels.

This situation demonstrates that even simple security oversights can have costly and far-reaching consequences, regardless of the industry.

If you would like help establishing a cybersecurity strategy that aims to keep downtime to a minimum and help you get your hands on beneficial software and strategies that you may not have at the moment, give First Column IT a call today at (571) 470-5594.

Previous Post
April 23, 2026
5 Common IT Mistakes You Must Fix in 2026
In 2026, technology isn't just a support department—it's the engine of your business. But as tools like AI and cloud computing become more accessible, the margin for error has narrowed. A single misstep can lead to data breaches, wasted budgets, or total operational paralysis.
April 21, 2026
Why Paying a Ransomware Demand is a Total Scam
Getting hit with ransomware feels like a digital kidnapping. Your files are locked, your business is paralyzed, and some hacker is demanding a massive bag of crypto to give you the keys back.
April 18, 2026
Simple Habits to Significantly Boost Your Productivity
If you feel like your to-do list keeps growing every day, you aren’t alone. For many entrepreneurs, the day feels like a losing battle against the clock, switching from sales spreadsheets to marketing plans until your brain feels like it has too many tabs open.

Have a project in mind?

Start with our free consultation for VA, DC and MD companies. We will provide a detailed proposal and firm quote based on your specific IT support needs. All at a predictable monthly cost per seat.
Free Consultation - Sign Up Here