(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
Missing evidence for an audit test
“This looks like a phishing attempt”
High-risk vendor flagged
Recognizes a scam or fake offer
Strong passphrase used (not just complex password)
Avoids sharing credentials with anyone
Computer screen locked when away
“Can you see my screen?”
Forwards unusual emails to the security team
Deletes data they’re no longer authorized to retain
Avoids sending sensitive info unencrypted
Reports a suspicious email
Avoids public Wi‑Fi for work tasks
Notices spelling/grammar errors in a suspicious email
Recognizes a suspicious QR code
Someone’s connection freezes mid‑sentence
Missing BAA for a PHI‑handling vendor
Knows not to plug unknown USBs into devices
Identifies suspicious activity on their account
Uses only approved tools for work
Uses multi‑factor authentication
Declines to share information over the phone
Recognizes when someone asks for too much information
Shreds documents with personal or client info
Data not classified correctly
Shared credentials discovered
Creates a strong passphrase (not just a password)
Someone mentions “AI” or “Copilot.”
Locks computer when stepping away
Using secure file transfer instead of email
Reporting a lost or stolen device
Free!
Deletes unexpected attachments
Verifies sender email address
Mentions “Think before you click”
Stores sensitive files securely
USB stick plugged into a corporate laptop
Someone says “Let’s take that offline.”
Reports a suspicious text message
Attending a security awareness training session
Default password still in use
Completes annual security training
Saying “If it seems too good to be true, it probably is”
Updates software when prompted
“Sorry, I was on another call.”
“Shadow IT” app found
Unpatched system identified
Double-checks external recipients before sending
Uses company‑approved cloud storage
Hovering over links before clicking
Identifies a spoofed sender name
Updating software when prompted
“You’re on mute.”
Firewall rule allows “ANY/ANY” traffic
Double-checking an external email recipient
Sensitive data sent via unencrypted email
Avoids downloading unknown applications
Employee uses the “Report Phish” button
“If it seems too good to be true, it probably is”
Quarterly access review completed
Knows how to report an incident
Validates payment or change requests through a second channel
Recognizes an “urgent” or “act now” red flag
No documented incident response plan
Pet appears on camera
“We’ll accept the risk” (without documentation 😉)
Knows the organization’s security policies exist
Uses secure file transfer instead of email attachment