Web TrafficObstruction(VPN)EmailPhishingAwarenessEmailSPF/DKIMRecordsEndpointPasswordorBiometricsOnboarding& Off-BoardingChecklists1MCFree!AnnualSecurityAuditEmailAttackResponsePlanHURCloudDataPasswordEmailMFACloudDataMFASharedLinkExpirationPolicySecureCollaborationToolsEndpointScreenLocksEndpointLocal &OffsiteBackupConsolidatedResource &SoftwareManagementEmailThreatDetectionSecurePasswordManagementHUREmailPasswordEndpointProtectionSoftwareEndpointBackupReportingEmailEncryptionCloudDataBackupAdequateInternetSpeedsEndpointProtectionReportingWeb TrafficObstruction(VPN)EmailPhishingAwarenessEmailSPF/DKIMRecordsEndpointPasswordorBiometricsOnboarding& Off-BoardingChecklists1MCFree!AnnualSecurityAuditEmailAttackResponsePlanHURCloudDataPasswordEmailMFACloudDataMFASharedLinkExpirationPolicySecureCollaborationToolsEndpointScreenLocksEndpointLocal &OffsiteBackupConsolidatedResource &SoftwareManagementEmailThreatDetectionSecurePasswordManagementHUREmailPasswordEndpointProtectionSoftwareEndpointBackupReportingEmailEncryptionCloudDataBackupAdequateInternetSpeedsEndpointProtectionReporting

1MC Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Web Traffic Obstruction (VPN)
  2. Email Phishing Awareness
  3. Email SPF/DKIM Records
  4. Endpoint Password or Biometrics
  5. Onboarding & Off-Boarding Checklists
  6. 1MC Free!
  7. Annual Security Audit
  8. Email Attack Response Plan
  9. HUR Cloud Data Password
  10. Email MFA
  11. Cloud Data MFA
  12. Shared Link Expiration Policy
  13. Secure Collaboration Tools
  14. Endpoint Screen Locks
  15. Endpoint Local & Offsite Backup
  16. Consolidated Resource & Software Management
  17. Email Threat Detection
  18. Secure Password Management
  19. HUR Email Password
  20. Endpoint Protection Software
  21. Endpoint Backup Reporting
  22. Email Encryption
  23. Cloud Data Backup
  24. Adequate Internet Speeds
  25. Endpoint Protection Reporting