Firewall Protection Mobile Device Management HIPAA Compliance Manager Phishing Campaigns Mailbox backup Business Continuity Plan Managed Endpoint Protection (MDR) VPN Domain Authentication Acceptable Use Policy Bitlocker Endpoint Protection (EDR) Multi-Factor Authentication (MFA) Patch Management IT Audits Asset Documentation Cybersecurity Insurance Anti- Virus/Malware Protection Disaster Recovery Plan Penetration Tests Server Backup (onsite and remote) Security Awareness Training Email Security Permissions Based File Access Firewall Protection Mobile Device Management HIPAA Compliance Manager Phishing Campaigns Mailbox backup Business Continuity Plan Managed Endpoint Protection (MDR) VPN Domain Authentication Acceptable Use Policy Bitlocker Endpoint Protection (EDR) Multi-Factor Authentication (MFA) Patch Management IT Audits Asset Documentation Cybersecurity Insurance Anti- Virus/Malware Protection Disaster Recovery Plan Penetration Tests Server Backup (onsite and remote) Security Awareness Training Email Security Permissions Based File Access
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Firewall Protection
Mobile Device Management
HIPAA Compliance Manager
Phishing Campaigns
Mailbox backup
Business Continuity Plan
Managed Endpoint Protection (MDR)
VPN
Domain Authentication
Acceptable Use Policy
Bitlocker
Endpoint Protection (EDR)
Multi-Factor Authentication (MFA)
Patch Management
IT Audits
Asset Documentation
Cybersecurity Insurance
Anti-Virus/Malware Protection
Disaster Recovery Plan
Penetration Tests
Server Backup (onsite and remote)
Security Awareness Training
Email Security
Permissions Based File Access