EmailAttackResponsePlanHURCloudDataPasswordEmailMFASharedLinkExpirationPolicySecurePasswordManagementAdequateInternetSpeedsEndpointScreenLocksEndpointProtectionReportingAnnualSecurityAuditSecureCollaborationToolsOnboarding& Off-BoardingChecklistsHUREmailPasswordEndpointLocal &OffsiteBackup1MCFree!EndpointPasswordorBiometricsEndpointProtectionSoftwareWeb TrafficObstruction(VPN)EndpointBackupReportingCloudDataBackupEmailThreatDetectionEmailEncryptionConsolidatedResource &SoftwareManagementEmailPhishingAwarenessEmailSPF/DKIMRecordsCloudDataMFAEmailAttackResponsePlanHURCloudDataPasswordEmailMFASharedLinkExpirationPolicySecurePasswordManagementAdequateInternetSpeedsEndpointScreenLocksEndpointProtectionReportingAnnualSecurityAuditSecureCollaborationToolsOnboarding& Off-BoardingChecklistsHUREmailPasswordEndpointLocal &OffsiteBackup1MCFree!EndpointPasswordorBiometricsEndpointProtectionSoftwareWeb TrafficObstruction(VPN)EndpointBackupReportingCloudDataBackupEmailThreatDetectionEmailEncryptionConsolidatedResource &SoftwareManagementEmailPhishingAwarenessEmailSPF/DKIMRecordsCloudDataMFA

1MC Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Email Attack Response Plan
  2. HUR Cloud Data Password
  3. Email MFA
  4. Shared Link Expiration Policy
  5. Secure Password Management
  6. Adequate Internet Speeds
  7. Endpoint Screen Locks
  8. Endpoint Protection Reporting
  9. Annual Security Audit
  10. Secure Collaboration Tools
  11. Onboarding & Off-Boarding Checklists
  12. HUR Email Password
  13. Endpoint Local & Offsite Backup
  14. 1MC Free!
  15. Endpoint Password or Biometrics
  16. Endpoint Protection Software
  17. Web Traffic Obstruction (VPN)
  18. Endpoint Backup Reporting
  19. Cloud Data Backup
  20. Email Threat Detection
  21. Email Encryption
  22. Consolidated Resource & Software Management
  23. Email Phishing Awareness
  24. Email SPF/DKIM Records
  25. Cloud Data MFA