Email MFA 1MC Free! Endpoint Password or Biometrics Cloud Data MFA Adequate Internet Speeds Endpoint Local & Offsite Backup Email SPF/DKIM Records Cloud Data Backup Email Phishing Awareness Endpoint Backup Reporting Endpoint Screen Locks Email Attack Response Plan Endpoint Protection Reporting Consolidated Resource & Software Management HUR Email Password Annual Security Audit Onboarding & Off- Boarding Checklists Secure Collaboration Tools Secure Password Management Shared Link Expiration Policy Endpoint Protection Software Email Encryption Email Threat Detection Web Traffic Obstruction (VPN) HUR Cloud Data Password Email MFA 1MC Free! Endpoint Password or Biometrics Cloud Data MFA Adequate Internet Speeds Endpoint Local & Offsite Backup Email SPF/DKIM Records Cloud Data Backup Email Phishing Awareness Endpoint Backup Reporting Endpoint Screen Locks Email Attack Response Plan Endpoint Protection Reporting Consolidated Resource & Software Management HUR Email Password Annual Security Audit Onboarding & Off- Boarding Checklists Secure Collaboration Tools Secure Password Management Shared Link Expiration Policy Endpoint Protection Software Email Encryption Email Threat Detection Web Traffic Obstruction (VPN) HUR Cloud Data Password
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Email MFA
1MC Free!
Endpoint Password or Biometrics
Cloud Data MFA
Adequate Internet Speeds
Endpoint Local & Offsite Backup
Email SPF/DKIM
Records
Cloud Data Backup
Email Phishing Awareness
Endpoint Backup Reporting
Endpoint Screen Locks
Email Attack Response Plan
Endpoint Protection Reporting
Consolidated Resource & Software Management
HUR Email Password
Annual Security Audit
Onboarding
& Off-Boarding Checklists
Secure Collaboration Tools
Secure Password Management
Shared Link Expiration Policy
Endpoint Protection Software
Email Encryption
Email Threat Detection
Web Traffic Obstruction (VPN)
HUR Cloud Data Password