Page Loader Logo
Loading...
833-847-3280
Schedule a Call
Partner With Us

The Reason Behind Tom Brady’s Smashed Phone

You are a 4-time world champion, accused of acknowledging a scheme to tamper with footballs to win football games, with a world-class beautiful wife and kids, tons of famous friends and, to support a one-sided biased investigation, you are asked for your cellphone and the information on it.

I would have smashed it too.

To me, the issue is not whether Brady’s phone had information on it that was pertinent to the investigation, the fact is that the phone contained lots of other information that was NOT pertinent to the investigation. Can you imagine what the contents of a celebrity’s phone looks like? With the success, wife and life that Tom Brady leads, I can picture the shallow, profit hungry press just rubbing their hands and licking their chops waiting for the first leaked photos or texts.

Good job Tom.

If you google “leaks and the NFL,” you get the picture that information provided or generated by the NFL to keep a secret is about as safe as the classified information that was stored on Hillary Clinton’s personal email server (which, for the uninformed, is suspected to be in China). There are numerous reports of leaked schedules, contract information and even leaks on “Deflategate.” If the NFL cannot guarantee the privacy of the league’s information entrusted to them, how would they extract, analyze and protect the enormous amount of data that was on the phone? Especially an overzealous league that has already proclaimed Tom Brady’s and the Patriot’s guilt and have imposed immense fines and punishment on them. That information would have been on the Internet in a week.

So why talk about this in a cybersecurity blog?

In cybersecurity, trusting critical information such as personally identifiable information, healthcare information, personal information or intellectual property is a critical decision for any person or business. Whether it’s being stored on the cloud, or on your own business server, the owner of that data must be sure that the entity trusted with the data can protect it using best business practices such as encryption, log monitoring, periodic vulnerability scans and penetration tests, limited access rights and up-to-date firewalls, antivirus and operating systems. In cybersecurity, proper data protection ensures the privacy of that information, which is a proper expectation of any person. Without the ability to guarantee the protection of information from being leaked, the NFL gave up its right to request the phone and the information on it.

The next time the NFL goes after a team or player, they should right their leaky boat and generate the trust between the players and the league that their data will be protected.

Or maybe they just need a good cybersecurity company?

Latest Posts

A transparent image used for creating empty spaces in columns
Welcome to today’s briefing on a crucial topic in the realm of cybersecurity: internal network penetration testing. Now, I know that the term might sound a bit intimidating but fear not. By the end of this discussion, you’ll have a solid understanding of what it…
A transparent image used for creating empty spaces in columns
 In the world of cybersecurity, there’s a misconception that a clean pen testing report means something was missed or the test wasn’t thorough enough. But here’s the truth: receiving a clean report from your penetration test is not only a positive outcome—it’s a testament…
A transparent image used for creating empty spaces in columns
Hey there, folks! Let’s get one thing straight: when MainNerve talks about penetration testing, we’re diving deep into the world of cybersecurity. But hey, we know what people think when we say “penetration testing.” So, buckle up because we’re about to compare pen testing to…
A transparent image used for creating empty spaces in columns
 In the fast-paced world of managed IT services, we know that time is money. Your clients rely on you to keep their systems secure, and you need partners who can deliver top-notch services without slowing you down. If you’re a Managed Service Provider (MSP)…
A transparent image used for creating empty spaces in columns
The primary purpose of performing a penetration test is to simulate real-world attacks on a computer system, network, or application. This is done by skilled cybersecurity professionals, who are tasked with identifying vulnerabilities and weaknesses that malicious actors could exploit. Their role is crucial in…
A transparent image used for creating empty spaces in columns
 If your business relies on older technology, you’ll want to listen up. We’re highlighting a critical weakness in many organizations’ defenses: legacy systems. What Are Legacy Systems? Legacy systems are outdated technologies that are no longer supported with updates or patches from their creators.…
contact

Our Team

Name(Required)
This field is for validation purposes and should be left unchanged.
quick links to

Our Services

On Load
Where? .serviceMM
What? Mega Menu: Services
201 E Pikes Peak Ave Suite 2025
Colorado Springs, CO 80903