Monitorpaymentrecords forunfamiliarchargesReportphishingCheck thatyour devices'software isup to dateVerify yourpasswordrecoverycontact infoUse MFA(multi-factorauthentication)DeletesuspiciousmessagesVerify yourkeyprogramsare updatedBe mindfulof how youuse socialmediaReflect,thenconnectBackup yourpersonaldata or verifyyour backupsettingsInstall areputableantivirusVerify senderbeforeopeningemailattachmentsDon't leavepersonaldevicesunattendedUse apasswordmanagerUpdatepasswordsregularlyThinkbeforeyou postThinkbeforeyou clickImprovepasswordstrengthOnly onlineshop ontrustedsitesPreviewlinksbeforeyou clickMake sureyour sensitivedocumentsare storedsafelyLock yourcomputer orlog outbefore youwalk awayBe on thelookoutfor phishyemailsAvoidsharingpersonalinformationonlineMonitorpaymentrecords forunfamiliarchargesReportphishingCheck thatyour devices'software isup to dateVerify yourpasswordrecoverycontact infoUse MFA(multi-factorauthentication)DeletesuspiciousmessagesVerify yourkeyprogramsare updatedBe mindfulof how youuse socialmediaReflect,thenconnectBackup yourpersonaldata or verifyyour backupsettingsInstall areputableantivirusVerify senderbeforeopeningemailattachmentsDon't leavepersonaldevicesunattendedUse apasswordmanagerUpdatepasswordsregularlyThinkbeforeyou postThinkbeforeyou clickImprovepasswordstrengthOnly onlineshop ontrustedsitesPreviewlinksbeforeyou clickMake sureyour sensitivedocumentsare storedsafelyLock yourcomputer orlog outbefore youwalk awayBe on thelookoutfor phishyemailsAvoidsharingpersonalinformationonline

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Monitor payment records for unfamiliar charges
  2. Report phishing
  3. Check that your devices' software is up to date
  4. Verify your password recovery contact info
  5. Use MFA (multi-factor authentication)
  6. Delete suspicious messages
  7. Verify your key programs are updated
  8. Be mindful of how you use social media
  9. Reflect, then connect
  10. Backup your personal data or verify your backup settings
  11. Install a reputable antivirus
  12. Verify sender before opening email attachments
  13. Don't leave personal devices unattended
  14. Use a password manager
  15. Update passwords regularly
  16. Think before you post
  17. Think before you click
  18. Improve password strength
  19. Only online shop on trusted sites
  20. Preview links before you click
  21. Make sure your sensitive documents are stored safely
  22. Lock your computer or log out before you walk away
  23. Be on the lookout for phishy emails
  24. Avoid sharing personal information online