EmailMFA1MCFree!EndpointPasswordorBiometricsCloudDataMFAAdequateInternetSpeedsEndpointLocal &OffsiteBackupEmailSPF/DKIMRecordsCloudDataBackupEmailPhishingAwarenessEndpointBackupReportingEndpointScreenLocksEmailAttackResponsePlanEndpointProtectionReportingConsolidatedResource &SoftwareManagementHUREmailPasswordAnnualSecurityAuditOnboarding& Off-BoardingChecklistsSecureCollaborationToolsSecurePasswordManagementSharedLinkExpirationPolicyEndpointProtectionSoftwareEmailEncryptionEmailThreatDetectionWeb TrafficObstruction(VPN)HURCloudDataPasswordEmailMFA1MCFree!EndpointPasswordorBiometricsCloudDataMFAAdequateInternetSpeedsEndpointLocal &OffsiteBackupEmailSPF/DKIMRecordsCloudDataBackupEmailPhishingAwarenessEndpointBackupReportingEndpointScreenLocksEmailAttackResponsePlanEndpointProtectionReportingConsolidatedResource &SoftwareManagementHUREmailPasswordAnnualSecurityAuditOnboarding& Off-BoardingChecklistsSecureCollaborationToolsSecurePasswordManagementSharedLinkExpirationPolicyEndpointProtectionSoftwareEmailEncryptionEmailThreatDetectionWeb TrafficObstruction(VPN)HURCloudDataPassword

1MC Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Email MFA
  2. 1MC Free!
  3. Endpoint Password or Biometrics
  4. Cloud Data MFA
  5. Adequate Internet Speeds
  6. Endpoint Local & Offsite Backup
  7. Email SPF/DKIM Records
  8. Cloud Data Backup
  9. Email Phishing Awareness
  10. Endpoint Backup Reporting
  11. Endpoint Screen Locks
  12. Email Attack Response Plan
  13. Endpoint Protection Reporting
  14. Consolidated Resource & Software Management
  15. HUR Email Password
  16. Annual Security Audit
  17. Onboarding & Off-Boarding Checklists
  18. Secure Collaboration Tools
  19. Secure Password Management
  20. Shared Link Expiration Policy
  21. Endpoint Protection Software
  22. Email Encryption
  23. Email Threat Detection
  24. Web Traffic Obstruction (VPN)
  25. HUR Cloud Data Password