EmailMFAConsolidatedResource &SoftwareManagementOnboarding& Off-BoardingChecklistsHUREmailPasswordAnnualSecurityAuditSharedLinkExpirationPolicySecureCollaborationToolsAdequateInternetSpeedsEndpointPasswordorBiometricsEmailEncryptionEndpointLocal &OffsiteBackupEmailAttackResponsePlanHURCloudDataPasswordCloudDataBackupCloudDataMFAEndpointBackupReportingEmailThreatDetectionEmailPhishingAwarenessEndpointProtectionSoftwareEndpointScreenLocks1MCFree!EndpointProtectionReportingSecurePasswordManagementEmailSPF/DKIMRecordsWeb TrafficObstruction(VPN)EmailMFAConsolidatedResource &SoftwareManagementOnboarding& Off-BoardingChecklistsHUREmailPasswordAnnualSecurityAuditSharedLinkExpirationPolicySecureCollaborationToolsAdequateInternetSpeedsEndpointPasswordorBiometricsEmailEncryptionEndpointLocal &OffsiteBackupEmailAttackResponsePlanHURCloudDataPasswordCloudDataBackupCloudDataMFAEndpointBackupReportingEmailThreatDetectionEmailPhishingAwarenessEndpointProtectionSoftwareEndpointScreenLocks1MCFree!EndpointProtectionReportingSecurePasswordManagementEmailSPF/DKIMRecordsWeb TrafficObstruction(VPN)

1MC Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Email MFA
  2. Consolidated Resource & Software Management
  3. Onboarding & Off-Boarding Checklists
  4. HUR Email Password
  5. Annual Security Audit
  6. Shared Link Expiration Policy
  7. Secure Collaboration Tools
  8. Adequate Internet Speeds
  9. Endpoint Password or Biometrics
  10. Email Encryption
  11. Endpoint Local & Offsite Backup
  12. Email Attack Response Plan
  13. HUR Cloud Data Password
  14. Cloud Data Backup
  15. Cloud Data MFA
  16. Endpoint Backup Reporting
  17. Email Threat Detection
  18. Email Phishing Awareness
  19. Endpoint Protection Software
  20. Endpoint Screen Locks
  21. 1MC Free!
  22. Endpoint Protection Reporting
  23. Secure Password Management
  24. Email SPF/DKIM Records
  25. Web Traffic Obstruction (VPN)