Email Attack Response Plan HUR Cloud Data Password Email MFA Shared Link Expiration Policy Secure Password Management Adequate Internet Speeds Endpoint Screen Locks Endpoint Protection Reporting Annual Security Audit Secure Collaboration Tools Onboarding & Off- Boarding Checklists HUR Email Password Endpoint Local & Offsite Backup 1MC Free! Endpoint Password or Biometrics Endpoint Protection Software Web Traffic Obstruction (VPN) Endpoint Backup Reporting Cloud Data Backup Email Threat Detection Email Encryption Consolidated Resource & Software Management Email Phishing Awareness Email SPF/DKIM Records Cloud Data MFA Email Attack Response Plan HUR Cloud Data Password Email MFA Shared Link Expiration Policy Secure Password Management Adequate Internet Speeds Endpoint Screen Locks Endpoint Protection Reporting Annual Security Audit Secure Collaboration Tools Onboarding & Off- Boarding Checklists HUR Email Password Endpoint Local & Offsite Backup 1MC Free! Endpoint Password or Biometrics Endpoint Protection Software Web Traffic Obstruction (VPN) Endpoint Backup Reporting Cloud Data Backup Email Threat Detection Email Encryption Consolidated Resource & Software Management Email Phishing Awareness Email SPF/DKIM Records Cloud Data MFA
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Email Attack Response Plan
HUR Cloud Data Password
Email MFA
Shared Link Expiration Policy
Secure Password Management
Adequate Internet Speeds
Endpoint Screen Locks
Endpoint Protection Reporting
Annual Security Audit
Secure Collaboration Tools
Onboarding
& Off-Boarding Checklists
HUR Email Password
Endpoint Local & Offsite Backup
1MC Free!
Endpoint Password or Biometrics
Endpoint Protection Software
Web Traffic Obstruction (VPN)
Endpoint Backup Reporting
Cloud Data Backup
Email Threat Detection
Email Encryption
Consolidated Resource & Software Management
Email Phishing Awareness
Email SPF/DKIM
Records
Cloud Data MFA