(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
Recognizes a scam or fake offer
Notices spelling/grammar errors in a suspicious email
Avoids public Wi‑Fi for work tasks
Locks computer when stepping away
Deletes unexpected attachments
Uses multi‑factor authentication
Mentions “Think before you click”
Knows how to report an incident
Uses company‑approved cloud storage
Knows the organization’s security policies exist
Stores sensitive files securely
Shreds documents with personal or client info
Identifies suspicious activity on their account
“This looks like a phishing attempt”
Creates a strong passphrase (not just a password)
Knows not to plug unknown USBs into devices
Forwards unusual emails to the security team
Avoids sending sensitive info unencrypted
Recognizes when someone asks for too much information
Validates payment or change requests through a second channel
Hovering over links before clicking
Recognizes an “urgent” or “act now” red flag
Free!
Avoids taking photos/screenshots of client data
Uses only approved tools for work
Reports a suspicious text message
Identifies a spoofed sender name
Recognizes a suspicious QR code
Deletes data they’re no longer authorized to retain
Avoids downloading unknown applications
Updates software when prompted
Uses approved systems for work files
“If it seems too good to be true, it probably is”
Avoids sharing credentials with anyone
Declines to share information over the phone
Verifies sender email address
Reports a suspicious email
Double-checks external recipients before sending
Completes annual security training
Recognizes a fake login page
Uses secure file transfer instead of email attachment