Data hygiene-Deleteunneeded datafromE-mail and BoxSend questionabout trainingtopic tosecops@politicoMake sureyour phoneand mobileapps are upto dateCollaborate ondocumentthrough Box inweb browserSharefolder/file withcolleaguethrough BoxlinkPut passwordsin PasswordManager orupdate repeatpasswords to beuniquepassphraseEnable TwoFactor/ Multi-factor onpersonalaccountsReportphish(not spam) tocyberdesk@politicoSet yoursocial mediaaccounts toprivateWatch YouTubevideo ‘How EasyIt Is To CrackYour Password,With KevinMitnick’Complete 3Cybersecuritycourses inPOLITICOUniversityAttend livesession ofCybersecurityBrown BagReceiveexternaldocument(s)shared toBoxDon’t clickPOLITICOphishemailsVerifydeviceson homenetworkWatchrecordedsession ofCybersecurityBrown BagAttend livesession ofCybersecurityBrown BagRemovePOLITICOfiles from localmachine andstore in BoxCheck if your E-mailhas been includedin a breach. Go to“Have I beenpwned” website andenter E-mail.Restart yourcomputer toensure securityupdates havebeen installedReadPOLITICOarticlerelating tocybersecurityDelete appsyou no longeruse (phone,computer,tablet)Participate inCybersecuritygame (notBingo)All teammembersare playingbingoData hygiene-Deleteunneeded datafromE-mail and BoxSend questionabout trainingtopic tosecops@politicoMake sureyour phoneand mobileapps are upto dateCollaborate ondocumentthrough Box inweb browserSharefolder/file withcolleaguethrough BoxlinkPut passwordsin PasswordManager orupdate repeatpasswords to beuniquepassphraseEnable TwoFactor/ Multi-factor onpersonalaccountsReportphish(not spam) tocyberdesk@politicoSet yoursocial mediaaccounts toprivateWatch YouTubevideo ‘How EasyIt Is To CrackYour Password,With KevinMitnick’Complete 3Cybersecuritycourses inPOLITICOUniversityAttend livesession ofCybersecurityBrown BagReceiveexternaldocument(s)shared toBoxDon’t clickPOLITICOphishemailsVerifydeviceson homenetworkWatchrecordedsession ofCybersecurityBrown BagAttend livesession ofCybersecurityBrown BagRemovePOLITICOfiles from localmachine andstore in BoxCheck if your E-mailhas been includedin a breach. Go to“Have I beenpwned” website andenter E-mail.Restart yourcomputer toensure securityupdates havebeen installedReadPOLITICOarticlerelating tocybersecurityDelete appsyou no longeruse (phone,computer,tablet)Participate inCybersecuritygame (notBingo)All teammembersare playingbingo

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Data hygiene- Delete unneeded data from E-mail and Box
  2. Send question about training topic to secops@politico
  3. Make sure your phone and mobile apps are up to date
  4. Collaborate on document through Box in web browser
  5. Share folder/file with colleague through Box link
  6. Put passwords in Password Manager or update repeat passwords to be unique passphrase
  7. Enable Two Factor/ Multi-factor on personal accounts
  8. Report phish (not spam) to cyberdesk@politico
  9. Set your social media accounts to private
  10. Watch YouTube video ‘How Easy It Is To Crack Your Password, With Kevin Mitnick’
  11. Complete 3 Cybersecurity courses in POLITICO University
  12. Attend live session of Cybersecurity Brown Bag
  13. Receive external document(s) shared to Box
  14. Don’t click POLITICO phish emails
  15. Verify devices on home network
  16. Watch recorded session of Cybersecurity Brown Bag
  17. Attend live session of Cybersecurity Brown Bag
  18. Remove POLITICO files from local machine and store in Box
  19. Check if your E-mail has been included in a breach. Go to “Have I been pwned” website and enter E-mail.
  20. Restart your computer to ensure security updates have been installed
  21. Read POLITICO article relating to cybersecurity
  22. Delete apps you no longer use (phone, computer, tablet)
  23. Participate in Cybersecurity game (not Bingo)
  24. All team members are playing bingo