Welcome to the First Column IT Tech Blog

HomeBlog
Cybersecurity Lessons From an NFL Draft Day Prank

Cybersecurity Lessons From an NFL Draft Day Prank

May 14, 2025

Sometimes, a real-world event vividly illustrates the importance of digital security basics. The recent NFL draft provided just such a case, involving an unlocked iPad, a prank call, and significant consequences.

The story centers around Shedeur Sanders, a highly anticipated draft prospect, and Jeff Ulbrich, the Atlanta Falcons' Defensive Coordinator. To maintain security during the draft, prospects use special phone numbers known only to NFL teams. Ulbrich had this sensitive contact list stored on his iPad.

Days before the draft, Ulbrich's son, Jax, used the unlocked iPad, discovered Sanders' private number, and recorded it. On draft day, Jax and a friend used the number to prank Sanders, posing as the New Orleans Saints GM, claiming they were about to draft him. This prank came as Sanders experienced a draft-day slide, falling from a projected first-round pick to the 144th selection; in the fifth round.

The incident didn't stay private. Video emerged, leading to Jax Ulbrich issuing a public apology. More tangibly, the NFL fined Jeff Ulbrich $100,000 and the Falcons organization $250,000 for the security lapse. Beyond the fines, the event potentially cost Sanders millions (the salary difference between early and later picks is vast) and undoubtedly created trust issues within the Falcons organization.

Lessons Beyond the Gridiron

There are lessons here that are relevant for any business; not just billion-dollar sports franchises. What can you learn from this NFL fumble? Here are a few things: 

  • The imperative of authentication - An unlocked device containing sensitive information was the root cause. Every phone, tablet, and computer, particularly those used for work, needs robust password protection or other authentication methods.
  • Access control matters - The NFL's system of secret numbers aimed for limited access. However, that sensitive data wasn't secured on the coordinator's device. Businesses must ensure data access is restricted and protected wherever it's stored or accessed.
  • Recognizing deception - The prank call, using impersonation for deceptive purposes, is functionally similar to a phishing attack. It's a potent reminder to treat unexpected communications with caution and verify requests through established channels.

This situation demonstrates that even simple security oversights can have costly and far-reaching consequences, regardless of the industry.

If you would like help establishing a cybersecurity strategy that aims to keep downtime to a minimum and help you get your hands on beneficial software and strategies that you may not have at the moment, give First Column IT a call today at (571) 470-5594.

Previous Post
June 21, 2025
AI's Role in the Future of Work: Transformation, Not Replacement
We understand that the whispers about artificial intelligence are growing louder. Understanding AI is the first step to harnessing its incredible potential for your business, bringing peace of mind to both employers and employees.
June 19, 2025
Protect Your Tech While Travelling
When you travel, it’s crucial to remember that your digital security needs to be just as mobile and well-prepared as you are. The usual advice—such as creating and properly storing strong passwords and avoiding unsecured Wi-Fi without a VPN—are great tips that we share all the time, but today, keeping your personal and professional data secure is a little more complicated. We’ve put together five security tips that are outside the norm to help you navigate your travels with confidence.
June 17, 2025
3 Ways to Make Technology Work for You
Is your business technology causing headaches? Does it slow you down or make you worry about security? Many business owners feel this way. Good news: you can almost surely make your tech work better for you. Here are three simple ways to make this happen.

Have a project in mind?

Start with our free consultation for VA, DC and MD companies. We will provide a detailed proposal and firm quote based on your specific IT support needs. All at a predictable monthly cost per seat.
Free Consultation - Sign Up Here