Onboarding& Off-BoardingChecklistsEmailMFASecureCollaborationToolsEmailPhishingAwarenessAdequateInternetSpeedsEmailEncryptionAnnualSecurityAuditEmailThreatDetectionEmailSPF/DKIMRecordsEndpointBackupReportingHUREmailPasswordSharedLinkExpirationPolicyHURCloudDataPasswordConsolidatedResource &SoftwareManagementCloudDataMFASecurePasswordManagementEndpointPasswordorBiometricsWeb TrafficObstruction(VPN)EndpointProtectionReportingCloudDataBackupEndpointScreenLocksEndpointLocal &OffsiteBackup1MCFree!EndpointProtectionSoftwareEmailAttackResponsePlanOnboarding& Off-BoardingChecklistsEmailMFASecureCollaborationToolsEmailPhishingAwarenessAdequateInternetSpeedsEmailEncryptionAnnualSecurityAuditEmailThreatDetectionEmailSPF/DKIMRecordsEndpointBackupReportingHUREmailPasswordSharedLinkExpirationPolicyHURCloudDataPasswordConsolidatedResource &SoftwareManagementCloudDataMFASecurePasswordManagementEndpointPasswordorBiometricsWeb TrafficObstruction(VPN)EndpointProtectionReportingCloudDataBackupEndpointScreenLocksEndpointLocal &OffsiteBackup1MCFree!EndpointProtectionSoftwareEmailAttackResponsePlan

1MC Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Onboarding & Off-Boarding Checklists
  2. Email MFA
  3. Secure Collaboration Tools
  4. Email Phishing Awareness
  5. Adequate Internet Speeds
  6. Email Encryption
  7. Annual Security Audit
  8. Email Threat Detection
  9. Email SPF/DKIM Records
  10. Endpoint Backup Reporting
  11. HUR Email Password
  12. Shared Link Expiration Policy
  13. HUR Cloud Data Password
  14. Consolidated Resource & Software Management
  15. Cloud Data MFA
  16. Secure Password Management
  17. Endpoint Password or Biometrics
  18. Web Traffic Obstruction (VPN)
  19. Endpoint Protection Reporting
  20. Cloud Data Backup
  21. Endpoint Screen Locks
  22. Endpoint Local & Offsite Backup
  23. 1MC Free!
  24. Endpoint Protection Software
  25. Email Attack Response Plan