Web Traffic Obstruction (VPN) Email Phishing Awareness Email SPF/DKIM Records Endpoint Password or Biometrics Onboarding & Off- Boarding Checklists 1MC Free! Annual Security Audit Email Attack Response Plan HUR Cloud Data Password Email MFA Cloud Data MFA Shared Link Expiration Policy Secure Collaboration Tools Endpoint Screen Locks Endpoint Local & Offsite Backup Consolidated Resource & Software Management Email Threat Detection Secure Password Management HUR Email Password Endpoint Protection Software Endpoint Backup Reporting Email Encryption Cloud Data Backup Adequate Internet Speeds Endpoint Protection Reporting Web Traffic Obstruction (VPN) Email Phishing Awareness Email SPF/DKIM Records Endpoint Password or Biometrics Onboarding & Off- Boarding Checklists 1MC Free! Annual Security Audit Email Attack Response Plan HUR Cloud Data Password Email MFA Cloud Data MFA Shared Link Expiration Policy Secure Collaboration Tools Endpoint Screen Locks Endpoint Local & Offsite Backup Consolidated Resource & Software Management Email Threat Detection Secure Password Management HUR Email Password Endpoint Protection Software Endpoint Backup Reporting Email Encryption Cloud Data Backup Adequate Internet Speeds Endpoint Protection Reporting
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Web Traffic Obstruction (VPN)
Email Phishing Awareness
Email SPF/DKIM
Records
Endpoint Password or Biometrics
Onboarding
& Off-Boarding Checklists
1MC Free!
Annual Security Audit
Email Attack Response Plan
HUR Cloud Data Password
Email MFA
Cloud Data MFA
Shared Link Expiration Policy
Secure Collaboration Tools
Endpoint Screen Locks
Endpoint Local & Offsite Backup
Consolidated Resource & Software Management
Email Threat Detection
Secure Password Management
HUR Email Password
Endpoint Protection Software
Endpoint Backup Reporting
Email Encryption
Cloud Data Backup
Adequate Internet Speeds
Endpoint Protection Reporting