EmailSPF/DKIMRecordsSecurePasswordManagementWeb TrafficObstruction(VPN)EndpointProtectionReportingEmailAttackResponsePlanCloudDataBackupEmailThreatDetectionEmailMFAConsolidatedResource &SoftwareManagementAdequateInternetSpeedsAnnualSecurityAuditEndpointScreenLocksOnboarding& Off-BoardingChecklistsCloudDataMFASecureCollaborationToolsSharedLinkExpirationPolicyEmailPhishingAwarenessEmailEncryptionHUREmailPasswordHURCloudDataPasswordEndpointLocal &OffsiteBackup1MCFree!EndpointBackupReportingEndpointProtectionSoftwareEndpointPasswordorBiometricsEmailSPF/DKIMRecordsSecurePasswordManagementWeb TrafficObstruction(VPN)EndpointProtectionReportingEmailAttackResponsePlanCloudDataBackupEmailThreatDetectionEmailMFAConsolidatedResource &SoftwareManagementAdequateInternetSpeedsAnnualSecurityAuditEndpointScreenLocksOnboarding& Off-BoardingChecklistsCloudDataMFASecureCollaborationToolsSharedLinkExpirationPolicyEmailPhishingAwarenessEmailEncryptionHUREmailPasswordHURCloudDataPasswordEndpointLocal &OffsiteBackup1MCFree!EndpointBackupReportingEndpointProtectionSoftwareEndpointPasswordorBiometrics

1MC Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Email SPF/DKIM Records
  2. Secure Password Management
  3. Web Traffic Obstruction (VPN)
  4. Endpoint Protection Reporting
  5. Email Attack Response Plan
  6. Cloud Data Backup
  7. Email Threat Detection
  8. Email MFA
  9. Consolidated Resource & Software Management
  10. Adequate Internet Speeds
  11. Annual Security Audit
  12. Endpoint Screen Locks
  13. Onboarding & Off-Boarding Checklists
  14. Cloud Data MFA
  15. Secure Collaboration Tools
  16. Shared Link Expiration Policy
  17. Email Phishing Awareness
  18. Email Encryption
  19. HUR Email Password
  20. HUR Cloud Data Password
  21. Endpoint Local & Offsite Backup
  22. 1MC Free!
  23. Endpoint Backup Reporting
  24. Endpoint Protection Software
  25. Endpoint Password or Biometrics