EmailPhishingAwarenessCloudDataMFAAnnualSecurityAuditEmailSPF/DKIMRecordsEndpointProtectionSoftwareEmailAttackResponsePlanOnboarding& Off-BoardingChecklistsEndpointBackupReportingHURCloudDataPasswordHUREmailPasswordSharedLinkExpirationPolicy1MCFree!Web TrafficObstruction(VPN)EndpointPasswordorBiometricsCloudDataBackupConsolidatedResource &SoftwareManagementSecurePasswordManagementAdequateInternetSpeedsEmailThreatDetectionEndpointScreenLocksEndpointProtectionReportingEndpointLocal &OffsiteBackupSecureCollaborationToolsEmailMFAEmailEncryptionEmailPhishingAwarenessCloudDataMFAAnnualSecurityAuditEmailSPF/DKIMRecordsEndpointProtectionSoftwareEmailAttackResponsePlanOnboarding& Off-BoardingChecklistsEndpointBackupReportingHURCloudDataPasswordHUREmailPasswordSharedLinkExpirationPolicy1MCFree!Web TrafficObstruction(VPN)EndpointPasswordorBiometricsCloudDataBackupConsolidatedResource &SoftwareManagementSecurePasswordManagementAdequateInternetSpeedsEmailThreatDetectionEndpointScreenLocksEndpointProtectionReportingEndpointLocal &OffsiteBackupSecureCollaborationToolsEmailMFAEmailEncryption

1MC Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Email Phishing Awareness
  2. Cloud Data MFA
  3. Annual Security Audit
  4. Email SPF/DKIM Records
  5. Endpoint Protection Software
  6. Email Attack Response Plan
  7. Onboarding & Off-Boarding Checklists
  8. Endpoint Backup Reporting
  9. HUR Cloud Data Password
  10. HUR Email Password
  11. Shared Link Expiration Policy
  12. 1MC Free!
  13. Web Traffic Obstruction (VPN)
  14. Endpoint Password or Biometrics
  15. Cloud Data Backup
  16. Consolidated Resource & Software Management
  17. Secure Password Management
  18. Adequate Internet Speeds
  19. Email Threat Detection
  20. Endpoint Screen Locks
  21. Endpoint Protection Reporting
  22. Endpoint Local & Offsite Backup
  23. Secure Collaboration Tools
  24. Email MFA
  25. Email Encryption