5Delete appsyou're nolonger usingon your phone25Report aphishinge-mail3What is it calledwhen you alteryour phonenumber to showup as someoneelse's?14what has akey but can'tbe opened?20Who is ourinternalauditor?8What is apassphrase4CompleteBVSSecurityTraining.23Who starsin You'vegot mail?1DefinePhishing24Create aStrong PW(long, unique,random)15Turn onAutomaticupdates onyour phone.16The rootcause of 95%of cyberbreaches are?21Turn on Autolock & set aPW on yourphone12where is thephishingbuttonlocated?17Name thebestcomputerrelated movie7DefineVishing18what is aPasswordmanager/safe?11Movedocuments fromyour laptop toSharePoint soit's backed up.6Ask Z or Aminthawhat month thisis (Cyber Securityawarenessmonth)9Have aclean deskpolicy19Definesmishing10What are theHat colors ofall the typesof hackers?22Who do youcall if youexperience adata breach?2Who's mostlikely to gofishing?5Delete appsyou're nolonger usingon your phone25Report aphishinge-mail3What is it calledwhen you alteryour phonenumber to showup as someoneelse's?14what has akey but can'tbe opened?20Who is ourinternalauditor?8What is apassphrase4CompleteBVSSecurityTraining.23Who starsin You'vegot mail?1DefinePhishing24Create aStrong PW(long, unique,random)15Turn onAutomaticupdates onyour phone.16The rootcause of 95%of cyberbreaches are?21Turn on Autolock & set aPW on yourphone12where is thephishingbuttonlocated?17Name thebestcomputerrelated movie7DefineVishing18what is aPasswordmanager/safe?11Movedocuments fromyour laptop toSharePoint soit's backed up.6Ask Z or Aminthawhat month thisis (Cyber Securityawarenessmonth)9Have aclean deskpolicy19Definesmishing10What are theHat colors ofall the typesof hackers?22Who do youcall if youexperience adata breach?2Who's mostlikely to gofishing?

Untitled Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. 5 Delete apps you're no longer using on your phone
  2. 25 Report a phishing e-mail
  3. 3 What is it called when you alter your phone number to show up as someone else's?
  4. 14 what has a key but can't be opened?
  5. 20 Who is our internal auditor?
  6. 8 What is a passphrase
  7. 4 Complete BVS Security Training.
  8. 23 Who stars in You've got mail?
  9. 1 Define Phishing
  10. 24 Create a Strong PW (long, unique, random)
  11. 15 Turn on Automatic updates on your phone.
  12. 16 The root cause of 95% of cyber breaches are?
  13. 21 Turn on Auto lock & set a PW on your phone
  14. 12 where is the phishing button located?
  15. 17 Name the best computer related movie
  16. 7 Define Vishing
  17. 18 what is a Password manager/safe?
  18. 11 Move documents from your laptop to SharePoint so it's backed up.
  19. 6 Ask Z or Amintha what month this is (Cyber Security awareness month)
  20. 9 Have a clean desk policy
  21. 19 Define smishing
  22. 10 What are the Hat colors of all the types of hackers?
  23. 22 Who do you call if you experience a data breach?
  24. 2 Who's most likely to go fishing?