Managed Endpoint Protection (MDR) IT Audits Mailbox backup Firewall Protection Anti- Virus/Malware Protection Disaster Recovery Plan Multi-Factor Authentication (MFA) Permissions Based File Access Acceptable Use Policy Endpoint Protection (EDR) Server Backup (onsite and remote) Security Awareness Training Penetration Tests Mobile Device Management VPN Business Continuity Plan Bitlocker Domain Authentication Cybersecurity Insurance HIPAA Compliance Manager Patch Management Asset Documentation Phishing Campaigns Email Security Managed Endpoint Protection (MDR) IT Audits Mailbox backup Firewall Protection Anti- Virus/Malware Protection Disaster Recovery Plan Multi-Factor Authentication (MFA) Permissions Based File Access Acceptable Use Policy Endpoint Protection (EDR) Server Backup (onsite and remote) Security Awareness Training Penetration Tests Mobile Device Management VPN Business Continuity Plan Bitlocker Domain Authentication Cybersecurity Insurance HIPAA Compliance Manager Patch Management Asset Documentation Phishing Campaigns Email Security
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Managed Endpoint Protection (MDR)
IT Audits
Mailbox backup
Firewall Protection
Anti-Virus/Malware Protection
Disaster Recovery Plan
Multi-Factor Authentication (MFA)
Permissions Based File Access
Acceptable Use Policy
Endpoint Protection (EDR)
Server Backup (onsite and remote)
Security Awareness Training
Penetration Tests
Mobile Device Management
VPN
Business Continuity Plan
Bitlocker
Domain Authentication
Cybersecurity Insurance
HIPAA Compliance Manager
Patch Management
Asset Documentation
Phishing Campaigns
Email Security