Email Phishing Awareness Cloud Data MFA Annual Security Audit Email SPF/DKIM Records Endpoint Protection Software Email Attack Response Plan Onboarding & Off- Boarding Checklists Endpoint Backup Reporting HUR Cloud Data Password HUR Email Password Shared Link Expiration Policy 1MC Free! Web Traffic Obstruction (VPN) Endpoint Password or Biometrics Cloud Data Backup Consolidated Resource & Software Management Secure Password Management Adequate Internet Speeds Email Threat Detection Endpoint Screen Locks Endpoint Protection Reporting Endpoint Local & Offsite Backup Secure Collaboration Tools Email MFA Email Encryption Email Phishing Awareness Cloud Data MFA Annual Security Audit Email SPF/DKIM Records Endpoint Protection Software Email Attack Response Plan Onboarding & Off- Boarding Checklists Endpoint Backup Reporting HUR Cloud Data Password HUR Email Password Shared Link Expiration Policy 1MC Free! Web Traffic Obstruction (VPN) Endpoint Password or Biometrics Cloud Data Backup Consolidated Resource & Software Management Secure Password Management Adequate Internet Speeds Email Threat Detection Endpoint Screen Locks Endpoint Protection Reporting Endpoint Local & Offsite Backup Secure Collaboration Tools Email MFA Email Encryption
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Email Phishing Awareness
Cloud Data MFA
Annual Security Audit
Email SPF/DKIM
Records
Endpoint Protection Software
Email Attack Response Plan
Onboarding
& Off-Boarding Checklists
Endpoint Backup Reporting
HUR Cloud Data Password
HUR Email Password
Shared Link Expiration Policy
1MC Free!
Web Traffic Obstruction (VPN)
Endpoint Password or Biometrics
Cloud Data Backup
Consolidated Resource & Software Management
Secure Password Management
Adequate Internet Speeds
Email Threat Detection
Endpoint Screen Locks
Endpoint Protection Reporting
Endpoint Local & Offsite Backup
Secure Collaboration Tools
Email MFA
Email Encryption