(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
Recognizes a suspicious QR code
Recognizes when someone asks for too much information
Declines to share information over the phone
“This looks like a phishing attempt”
Validates payment or change requests through a second channel
Uses multi‑factor authentication
Identifies a spoofed sender name
Recognizes a scam or fake offer
Completes annual security training
Knows how to report an incident
Avoids sending sensitive info unencrypted
Recognizes a fake login page
Creates a strong passphrase (not just a password)
Forwards unusual emails to the security team
Uses company‑approved cloud storage
Avoids downloading unknown applications
Verifies sender email address
Uses secure file transfer instead of email attachment
Avoids taking photos/screenshots of client data
Reports a suspicious text message
Deletes data they’re no longer authorized to retain
Mentions “Think before you click”
Updates software when prompted
Stores sensitive files securely
Double-checks external recipients before sending
Avoids sharing credentials with anyone
Knows the organization’s security policies exist
Notices spelling/grammar errors in a suspicious email