EndpointProtectionReportingEmailMFAEndpointPasswordorBiometricsSharedLinkExpirationPolicyEndpointBackupReportingSecureCollaborationToolsEndpointProtectionSoftwareEmailPhishingAwarenessAdequateInternetSpeedsEmailEncryptionEmailThreatDetectionCloudDataBackupConsolidatedResource &SoftwareManagementWeb TrafficObstruction(VPN)CloudDataMFAEmailAttackResponsePlanHURCloudDataPasswordEmailSPF/DKIMRecordsHUREmailPasswordEndpointLocal &OffsiteBackupOnboarding& Off-BoardingChecklists1MCFree!EndpointScreenLocksAnnualSecurityAuditSecurePasswordManagementEndpointProtectionReportingEmailMFAEndpointPasswordorBiometricsSharedLinkExpirationPolicyEndpointBackupReportingSecureCollaborationToolsEndpointProtectionSoftwareEmailPhishingAwarenessAdequateInternetSpeedsEmailEncryptionEmailThreatDetectionCloudDataBackupConsolidatedResource &SoftwareManagementWeb TrafficObstruction(VPN)CloudDataMFAEmailAttackResponsePlanHURCloudDataPasswordEmailSPF/DKIMRecordsHUREmailPasswordEndpointLocal &OffsiteBackupOnboarding& Off-BoardingChecklists1MCFree!EndpointScreenLocksAnnualSecurityAuditSecurePasswordManagement

1MC Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Endpoint Protection Reporting
  2. Email MFA
  3. Endpoint Password or Biometrics
  4. Shared Link Expiration Policy
  5. Endpoint Backup Reporting
  6. Secure Collaboration Tools
  7. Endpoint Protection Software
  8. Email Phishing Awareness
  9. Adequate Internet Speeds
  10. Email Encryption
  11. Email Threat Detection
  12. Cloud Data Backup
  13. Consolidated Resource & Software Management
  14. Web Traffic Obstruction (VPN)
  15. Cloud Data MFA
  16. Email Attack Response Plan
  17. HUR Cloud Data Password
  18. Email SPF/DKIM Records
  19. HUR Email Password
  20. Endpoint Local & Offsite Backup
  21. Onboarding & Off-Boarding Checklists
  22. 1MC Free!
  23. Endpoint Screen Locks
  24. Annual Security Audit
  25. Secure Password Management