Permissions Based File Access Mailbox backup IT Audits Security Awareness Training Business Continuity Plan Disaster Recovery Plan Domain Authentication Email Security Firewall Protection Acceptable Use Policy Phishing Campaigns Managed Endpoint Protection (MDR) HIPAA Compliance Manager Penetration Tests Asset Documentation Cybersecurity Insurance Endpoint Protection (EDR) Multi-Factor Authentication (MFA) Bitlocker Server Backup (onsite and remote) Patch Management Mobile Device Management Anti- Virus/Malware Protection VPN Permissions Based File Access Mailbox backup IT Audits Security Awareness Training Business Continuity Plan Disaster Recovery Plan Domain Authentication Email Security Firewall Protection Acceptable Use Policy Phishing Campaigns Managed Endpoint Protection (MDR) HIPAA Compliance Manager Penetration Tests Asset Documentation Cybersecurity Insurance Endpoint Protection (EDR) Multi-Factor Authentication (MFA) Bitlocker Server Backup (onsite and remote) Patch Management Mobile Device Management Anti- Virus/Malware Protection VPN
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Permissions Based File Access
Mailbox backup
IT Audits
Security Awareness Training
Business Continuity Plan
Disaster Recovery Plan
Domain Authentication
Email Security
Firewall Protection
Acceptable Use Policy
Phishing Campaigns
Managed Endpoint Protection (MDR)
HIPAA Compliance Manager
Penetration Tests
Asset Documentation
Cybersecurity Insurance
Endpoint Protection (EDR)
Multi-Factor Authentication (MFA)
Bitlocker
Server Backup (onsite and remote)
Patch Management
Mobile Device Management
Anti-Virus/Malware Protection
VPN