SharedLinkExpirationPolicyCloudDataBackupAnnualSecurityAuditCloudDataMFAEndpointBackupReportingSecureCollaborationToolsEmailEncryptionHUREmailPasswordEndpointProtectionSoftware1MCFree!EndpointProtectionReportingEmailPhishingAwarenessConsolidatedResource &SoftwareManagementEndpointScreenLocksEmailAttackResponsePlanOnboarding& Off-BoardingChecklistsSecurePasswordManagementEndpointLocal &OffsiteBackupEmailSPF/DKIMRecordsHURCloudDataPasswordEndpointPasswordorBiometricsAdequateInternetSpeedsEmailThreatDetectionWeb TrafficObstruction(VPN)EmailMFASharedLinkExpirationPolicyCloudDataBackupAnnualSecurityAuditCloudDataMFAEndpointBackupReportingSecureCollaborationToolsEmailEncryptionHUREmailPasswordEndpointProtectionSoftware1MCFree!EndpointProtectionReportingEmailPhishingAwarenessConsolidatedResource &SoftwareManagementEndpointScreenLocksEmailAttackResponsePlanOnboarding& Off-BoardingChecklistsSecurePasswordManagementEndpointLocal &OffsiteBackupEmailSPF/DKIMRecordsHURCloudDataPasswordEndpointPasswordorBiometricsAdequateInternetSpeedsEmailThreatDetectionWeb TrafficObstruction(VPN)EmailMFA

1MC Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Shared Link Expiration Policy
  2. Cloud Data Backup
  3. Annual Security Audit
  4. Cloud Data MFA
  5. Endpoint Backup Reporting
  6. Secure Collaboration Tools
  7. Email Encryption
  8. HUR Email Password
  9. Endpoint Protection Software
  10. 1MC Free!
  11. Endpoint Protection Reporting
  12. Email Phishing Awareness
  13. Consolidated Resource & Software Management
  14. Endpoint Screen Locks
  15. Email Attack Response Plan
  16. Onboarding & Off-Boarding Checklists
  17. Secure Password Management
  18. Endpoint Local & Offsite Backup
  19. Email SPF/DKIM Records
  20. HUR Cloud Data Password
  21. Endpoint Password or Biometrics
  22. Adequate Internet Speeds
  23. Email Threat Detection
  24. Web Traffic Obstruction (VPN)
  25. Email MFA