OhTech Services

Cybersecurity Lessons From an NFL Draft Day Prank

May 14th, 2025

Sometimes, a real-world event vividly illustrates the importance of digital security basics. The recent NFL draft provided just such a case, involving an unlocked iPad, a prank call, and significant consequences.

The story centers around Shedeur Sanders, a highly anticipated draft prospect, and Jeff Ulbrich, the Atlanta Falcons’ Defensive Coordinator. To maintain security during the draft, prospects use special phone numbers known only to NFL teams. Ulbrich had this sensitive contact list stored on his iPad.

Days before the draft, Ulbrich’s son, Jax, used the unlocked iPad, discovered Sanders’ private number, and recorded it. On draft day, Jax and a friend used the number to prank Sanders, posing as the New Orleans Saints GM, claiming they were about to draft him. This prank came as Sanders experienced a draft-day slide, falling from a projected first-round pick to the 144th selection; in the fifth round.

The incident didn’t stay private. Video emerged, leading to Jax Ulbrich issuing a public apology. More tangibly, the NFL fined Jeff Ulbrich $100,000 and the Falcons organization $250,000 for the security lapse. Beyond the fines, the event potentially cost Sanders millions (the salary difference between early and later picks is vast) and undoubtedly created trust issues within the Falcons organization.

Lessons Beyond the Gridiron

There are lessons here that are relevant for any business; not just billion-dollar sports franchises. What can you learn from this NFL fumble? Here are a few things: 

  • The imperative of authentication – An unlocked device containing sensitive information was the root cause. Every phone, tablet, and computer, particularly those used for work, needs robust password protection or other authentication methods.
  • Access control matters – The NFL’s system of secret numbers aimed for limited access. However, that sensitive data wasn’t secured on the coordinator’s device. Businesses must ensure data access is restricted and protected wherever it’s stored or accessed.
  • Recognizing deception – The prank call, using impersonation for deceptive purposes, is functionally similar to a phishing attack. It’s a potent reminder to treat unexpected communications with caution and verify requests through established channels.

This situation demonstrates that even simple security oversights can have costly and far-reaching consequences, regardless of the industry.

If you would like help establishing a cybersecurity strategy that aims to keep downtime to a minimum and help you get your hands on beneficial software and strategies that you may not have at the moment, give Oh-Tech a call today at 01202 835880.

June 16th, 2025

Use the MACH Architecture Framework to Plan Your Business’ Future

Businesses tend to strive for agility, meaning that they want to make changes quickly and effectively as their needs change. Technology often holds them back […]

Read More

June 13th, 2025

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Today is Global Wellness Day. As such, we wanted to invite you to consider a few ways to prioritize not just your mental and physical […]

Read More

June 11th, 2025

How a CRM Can Transform Your Customer Interactions

One of the most significant advantages of operating as a small or medium-sized business is that you can provide more personalized attention to your customers, […]

Read More