(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
Recognizes a scam or fake offer
Knows the organization’s security policies exist
Validates payment or change requests through a second channel
Recognizes an “urgent” or “act now” red flag
Uses approved systems for work files
Shreds documents with personal or client info
Recognizes when someone asks for too much information
Avoids downloading unknown applications
Forwards unusual emails to the security team
Updates software when prompted
Avoids sharing credentials with anyone
Uses only approved tools for work
Recognizes a fake login page
Notices spelling/grammar errors in a suspicious email
Completes annual security training
Locks computer when stepping away
Reports a suspicious text message
Verifies sender email address
Deletes unexpected attachments
Creates a strong passphrase (not just a password)
Avoids public Wi‑Fi for work tasks
Avoids sending sensitive info unencrypted
Avoids taking photos/screenshots of client data
Uses company‑approved cloud storage
“If it seems too good to be true, it probably is”
Deletes data they’re no longer authorized to retain
Knows how to report an incident
Stores sensitive files securely
Double-checks external recipients before sending
Hovering over links before clicking
Uses multi‑factor authentication
Recognizes a suspicious QR code
Free!
Knows not to plug unknown USBs into devices
Reports a suspicious email
Identifies suspicious activity on their account
“This looks like a phishing attempt”
Identifies a spoofed sender name
Uses secure file transfer instead of email attachment