(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
Recognizes a fake login page
Avoids downloading unknown applications
Uses only approved tools for work
“This looks like a phishing attempt”
Recognizes a suspicious QR code
Mentions “Think before you click”
Knows how to report an incident
Avoids public Wi‑Fi for work tasks
Knows the organization’s security policies exist
Knows not to plug unknown USBs into devices
Deletes data they’re no longer authorized to retain
Uses multi‑factor authentication
Reports a suspicious text message
Recognizes an “urgent” or “act now” red flag
Verifies sender email address
Notices spelling/grammar errors in a suspicious email
Free!
Avoids sending sensitive info unencrypted
Recognizes a scam or fake offer
Declines to share information over the phone
Updates software when prompted
Locks computer when stepping away
Completes annual security training
Validates payment or change requests through a second channel
Hovering over links before clicking
Identifies a spoofed sender name
Stores sensitive files securely
Uses secure file transfer instead of email attachment
Uses approved systems for work files
Shreds documents with personal or client info
Avoids taking photos/screenshots of client data
Forwards unusual emails to the security team
Reports a suspicious email
Avoids sharing credentials with anyone
Deletes unexpected attachments
Double-checks external recipients before sending
Uses company‑approved cloud storage
“If it seems too good to be true, it probably is”
Recognizes when someone asks for too much information