Verify yourkeyprogramsare updatedBe mindfulof how youuse socialmediaImprovepasswordstrengthMake sureyour sensitivedocumentsare storedsafelyThinkbeforeyou postBe on thelookoutfor phishyemailsReflect,thenconnectUse MFA(multi-factorauthentication)Monitorpaymentrecords forunfamiliarchargesUse apasswordmanagerVerify yourpasswordrecoverycontact infoDeletesuspiciousmessagesUpdatepasswordsregularlyCheck thatyour devices'software isup to dateAvoidsharingpersonalinformationonlineThinkbeforeyou clickInstall areputableantivirusOnly onlineshop ontrustedsitesVerify senderbeforeopeningemailattachmentsDon't leavepersonaldevicesunattendedReportphishingBackup yourpersonaldata or verifyyour backupsettingsPreviewlinksbeforeyou clickLock yourcomputer orlog outbefore youwalk awayVerify yourkeyprogramsare updatedBe mindfulof how youuse socialmediaImprovepasswordstrengthMake sureyour sensitivedocumentsare storedsafelyThinkbeforeyou postBe on thelookoutfor phishyemailsReflect,thenconnectUse MFA(multi-factorauthentication)Monitorpaymentrecords forunfamiliarchargesUse apasswordmanagerVerify yourpasswordrecoverycontact infoDeletesuspiciousmessagesUpdatepasswordsregularlyCheck thatyour devices'software isup to dateAvoidsharingpersonalinformationonlineThinkbeforeyou clickInstall areputableantivirusOnly onlineshop ontrustedsitesVerify senderbeforeopeningemailattachmentsDon't leavepersonaldevicesunattendedReportphishingBackup yourpersonaldata or verifyyour backupsettingsPreviewlinksbeforeyou clickLock yourcomputer orlog outbefore youwalk away

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Verify your key programs are updated
  2. Be mindful of how you use social media
  3. Improve password strength
  4. Make sure your sensitive documents are stored safely
  5. Think before you post
  6. Be on the lookout for phishy emails
  7. Reflect, then connect
  8. Use MFA (multi-factor authentication)
  9. Monitor payment records for unfamiliar charges
  10. Use a password manager
  11. Verify your password recovery contact info
  12. Delete suspicious messages
  13. Update passwords regularly
  14. Check that your devices' software is up to date
  15. Avoid sharing personal information online
  16. Think before you click
  17. Install a reputable antivirus
  18. Only online shop on trusted sites
  19. Verify sender before opening email attachments
  20. Don't leave personal devices unattended
  21. Report phishing
  22. Backup your personal data or verify your backup settings
  23. Preview links before you click
  24. Lock your computer or log out before you walk away