Shared Link Expiration Policy Cloud Data Backup Annual Security Audit Cloud Data MFA Endpoint Backup Reporting Secure Collaboration Tools Email Encryption HUR Email Password Endpoint Protection Software 1MC Free! Endpoint Protection Reporting Email Phishing Awareness Consolidated Resource & Software Management Endpoint Screen Locks Email Attack Response Plan Onboarding & Off- Boarding Checklists Secure Password Management Endpoint Local & Offsite Backup Email SPF/DKIM Records HUR Cloud Data Password Endpoint Password or Biometrics Adequate Internet Speeds Email Threat Detection Web Traffic Obstruction (VPN) Email MFA Shared Link Expiration Policy Cloud Data Backup Annual Security Audit Cloud Data MFA Endpoint Backup Reporting Secure Collaboration Tools Email Encryption HUR Email Password Endpoint Protection Software 1MC Free! Endpoint Protection Reporting Email Phishing Awareness Consolidated Resource & Software Management Endpoint Screen Locks Email Attack Response Plan Onboarding & Off- Boarding Checklists Secure Password Management Endpoint Local & Offsite Backup Email SPF/DKIM Records HUR Cloud Data Password Endpoint Password or Biometrics Adequate Internet Speeds Email Threat Detection Web Traffic Obstruction (VPN) Email MFA
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Shared Link Expiration Policy
Cloud Data Backup
Annual Security Audit
Cloud Data MFA
Endpoint Backup Reporting
Secure Collaboration Tools
Email Encryption
HUR Email Password
Endpoint Protection Software
1MC Free!
Endpoint Protection Reporting
Email Phishing Awareness
Consolidated Resource & Software Management
Endpoint Screen Locks
Email Attack Response Plan
Onboarding
& Off-Boarding Checklists
Secure Password Management
Endpoint Local & Offsite Backup
Email SPF/DKIM
Records
HUR Cloud Data Password
Endpoint Password or Biometrics
Adequate Internet Speeds
Email Threat Detection
Web Traffic Obstruction (VPN)
Email MFA