Endpoint Protection (EDR) Email Security Asset Documentation Server Backup (onsite and remote) VPN Penetration Tests Mailbox backup Anti- Virus/Malware Protection Bitlocker Acceptable Use Policy Disaster Recovery Plan Domain Authentication Mobile Device Management HIPAA Compliance Manager Phishing Campaigns Cybersecurity Insurance Multi-Factor Authentication (MFA) Permissions Based File Access IT Audits Managed Endpoint Protection (MDR) Patch Management Firewall Protection Business Continuity Plan Security Awareness Training Endpoint Protection (EDR) Email Security Asset Documentation Server Backup (onsite and remote) VPN Penetration Tests Mailbox backup Anti- Virus/Malware Protection Bitlocker Acceptable Use Policy Disaster Recovery Plan Domain Authentication Mobile Device Management HIPAA Compliance Manager Phishing Campaigns Cybersecurity Insurance Multi-Factor Authentication (MFA) Permissions Based File Access IT Audits Managed Endpoint Protection (MDR) Patch Management Firewall Protection Business Continuity Plan Security Awareness Training
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Endpoint Protection (EDR)
Email Security
Asset Documentation
Server Backup (onsite and remote)
VPN
Penetration Tests
Mailbox backup
Anti-Virus/Malware Protection
Bitlocker
Acceptable Use Policy
Disaster Recovery Plan
Domain Authentication
Mobile Device Management
HIPAA Compliance Manager
Phishing Campaigns
Cybersecurity Insurance
Multi-Factor Authentication (MFA)
Permissions Based File Access
IT Audits
Managed Endpoint Protection (MDR)
Patch Management
Firewall Protection
Business Continuity Plan
Security Awareness Training