833-847-3280
Schedule a Call

The Reason Behind Tom Brady’s Smashed Phone

You are a 4-time world champion, accused of acknowledging a scheme to tamper with footballs to win football games, with a world-class beautiful wife and kids, tons of famous friends and, to support a one-sided biased investigation, you are asked for your cellphone and the information on it.

I would have smashed it too.

To me, the issue is not whether Brady’s phone had information on it that was pertinent to the investigation, the fact is that the phone contained lots of other information that was NOT pertinent to the investigation. Can you imagine what the contents of a celebrity’s phone looks like? With the success, wife and life that Tom Brady leads, I can picture the shallow, profit hungry press just rubbing their hands and licking their chops waiting for the first leaked photos or texts.

Good job Tom.

If you google “leaks and the NFL,” you get the picture that information provided or generated by the NFL to keep a secret is about as safe as the classified information that was stored on Hillary Clinton’s personal email server (which, for the uninformed, is suspected to be in China). There are numerous reports of leaked schedules, contract information and even leaks on “Deflategate.” If the NFL cannot guarantee the privacy of the league’s information entrusted to them, how would they extract, analyze and protect the enormous amount of data that was on the phone? Especially an overzealous league that has already proclaimed Tom Brady’s and the Patriot’s guilt and have imposed immense fines and punishment on them. That information would have been on the Internet in a week.

So why talk about this in a cybersecurity blog?

In cybersecurity, trusting critical information such as personally identifiable information, healthcare information, personal information or intellectual property is a critical decision for any person or business. Whether it’s being stored on the cloud, or on your own business server, the owner of that data must be sure that the entity trusted with the data can protect it using best business practices such as encryption, log monitoring, periodic vulnerability scans and penetration tests, limited access rights and up-to-date firewalls, antivirus and operating systems. In cybersecurity, proper data protection ensures the privacy of that information, which is a proper expectation of any person. Without the ability to guarantee the protection of information from being leaked, the NFL gave up its right to request the phone and the information on it.

The next time the NFL goes after a team or player, they should right their leaky boat and generate the trust between the players and the league that their data will be protected.

Or maybe they just need a good cybersecurity company?

Latest Posts

A transparent image used for creating empty spaces in columns
In today’s digital landscape, cyberattacks are relentless, sophisticated, and increasingly costly. Yet, many government regulations designed to protect sensitive data and critical infrastructure fall short, not because they lack good intentions, but because they fail to explicitly require penetration testing as a standard practice. This regulatory ambiguity…
A transparent image used for creating empty spaces in columns
 Every IT manager knows the drill. You schedule your annual penetration test, the security team arrives, runs their tools, and delivers a comprehensive report detailing vulnerabilities and recommendations. You check the compliance box, file the report, and get back to your daily grind. Fast…
A transparent image used for creating empty spaces in columns
When a major brand like Victoria’s Secret, MGM, or T-Mobile gets hacked, it’s all over the news. These companies are household names, and a breach affecting them often exposes millions of customer records, making it a national, or even global, story. But what about small…
A transparent image used for creating empty spaces in columns
 Choosing a penetration tester isn’t just about credentials or price; it’s about trust, depth, and the results they deliver. In today’s rapidly evolving cybersecurity landscape, selecting the right penetration testing partner is more critical than ever. At MainNerve, we’ve witnessed significant shifts in the…
A transparent image used for creating empty spaces in columns
Cybersecurity threats in 2025 are evolving faster than most organizations can keep pace with. In early 2025, a global financial institution paid out a staggering $75 million following a ransomware attack. The cause? A single, compromised endpoint tied to a legacy application that had gone…
A transparent image used for creating empty spaces in columns
   Targeted retesting focuses only on the vulnerabilities you’ve already remediated. It’s scoped tightly around the affected systems, configurations, or application components that were updated, patched, or re-engineered in response to findings from the original penetration test. This approach offers several key benefits: 1.…
contact

Our Team

Name(Required)
This field is for validation purposes and should be left unchanged.
On Load
Where? .serviceMM
What? Mega Menu: Services