Show your social media account is privacy protected Provide input for future security training Define Phishing Define Phishing Participate in Doc. Lunch" Be caught by security properly wearing ID badge Give an example of a secure computer password Name a famous cyber security spy Show phone security with locked screen Name a cyber security threat Email PA Security Answer Security Question Define Computer Virus Name a cyber security threat Define computer virus Provide input for future security training Read Cyber Security DSS Pamphlet Answer security question Ask FSO a cyber security related question Participate in "Caption This" Participate in "Cyber Movie Montage" Report a suspicious email Complete Crossword Puzzle Report a security violation Show your social media account is privacy protected Provide input for future security training Define Phishing Define Phishing Participate in Doc. Lunch" Be caught by security properly wearing ID badge Give an example of a secure computer password Name a famous cyber security spy Show phone security with locked screen Name a cyber security threat Email PA Security Answer Security Question Define Computer Virus Name a cyber security threat Define computer virus Provide input for future security training Read Cyber Security DSS Pamphlet Answer security question Ask FSO a cyber security related question Participate in "Caption This" Participate in "Cyber Movie Montage" Report a suspicious email Complete Crossword Puzzle Report a security violation
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Show your social media account is privacy protected
Provide input for future security training
Define Phishing
Define Phishing
Participate in Doc. Lunch"
Be caught by security properly wearing ID badge
Give an example of a secure computer password
Name a famous cyber security spy
Show phone security with locked screen
Name a cyber security threat
Email PA Security
Answer Security Question
Define Computer Virus
Name a cyber security threat
Define computer virus
Provide input for future security training
Read Cyber Security DSS Pamphlet
Answer security question
Ask FSO a cyber security related question
Participate in "Caption This"
Participate in "Cyber Movie Montage"
Report a suspicious email
Complete Crossword Puzzle
Report a security violation