DeletesuspiciousmessagesCheck thatyour devices'software isup to dateOnly onlineshop ontrustedsitesUse MFA(multi-factorauthentication)Verify senderbeforeopeningemailattachmentsBe on thelookoutfor phishyemailsPreviewlinksbeforeyou clickMonitorpaymentrecords forunfamiliarchargesVerify yourkeyprogramsare updatedLock yourcomputer orlog outbefore youwalk awayDon't leavepersonaldevicesunattendedVerify yourpasswordrecoverycontact infoMake sureyour sensitivedocumentsare storedsafelyBackup yourpersonaldata or verifyyour backupsettingsBe mindfulof how youuse socialmediaUpdatepasswordsregularlyInstall areputableantivirusImprovepasswordstrengthReflect,thenconnectThinkbeforeyou postReportphishingThinkbeforeyou clickAvoidsharingpersonalinformationonlineUse apasswordmanagerDeletesuspiciousmessagesCheck thatyour devices'software isup to dateOnly onlineshop ontrustedsitesUse MFA(multi-factorauthentication)Verify senderbeforeopeningemailattachmentsBe on thelookoutfor phishyemailsPreviewlinksbeforeyou clickMonitorpaymentrecords forunfamiliarchargesVerify yourkeyprogramsare updatedLock yourcomputer orlog outbefore youwalk awayDon't leavepersonaldevicesunattendedVerify yourpasswordrecoverycontact infoMake sureyour sensitivedocumentsare storedsafelyBackup yourpersonaldata or verifyyour backupsettingsBe mindfulof how youuse socialmediaUpdatepasswordsregularlyInstall areputableantivirusImprovepasswordstrengthReflect,thenconnectThinkbeforeyou postReportphishingThinkbeforeyou clickAvoidsharingpersonalinformationonlineUse apasswordmanager

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Delete suspicious messages
  2. Check that your devices' software is up to date
  3. Only online shop on trusted sites
  4. Use MFA (multi-factor authentication)
  5. Verify sender before opening email attachments
  6. Be on the lookout for phishy emails
  7. Preview links before you click
  8. Monitor payment records for unfamiliar charges
  9. Verify your key programs are updated
  10. Lock your computer or log out before you walk away
  11. Don't leave personal devices unattended
  12. Verify your password recovery contact info
  13. Make sure your sensitive documents are stored safely
  14. Backup your personal data or verify your backup settings
  15. Be mindful of how you use social media
  16. Update passwords regularly
  17. Install a reputable antivirus
  18. Improve password strength
  19. Reflect, then connect
  20. Think before you post
  21. Report phishing
  22. Think before you click
  23. Avoid sharing personal information online
  24. Use a password manager