Sharefolder/file withcolleaguethrough BoxlinkDon’t clickPOLITICOphishemailsParticipate inCybersecuritygame (notBingo)Collaborate ondocumentthrough Box inweb browserAttend livesession ofCybersecurityBrown BagWatch YouTubevideo ‘HowEasy It Is ToCrack YourPassword, WithKevin Mitnick’Data hygiene-Deleteunneeded datafromE-mail and BoxCheck if your E-mail has beenincluded in abreach. Go to“Have I beenpwned” websiteand enter E-mail.RemovePOLITICOfiles from localmachine andstore in BoxSet yoursocial mediaaccounts toprivateRestart yourcomputer toensure securityupdates havebeen installedMake sureyour phoneand mobileapps are upto datePut passwordsin PasswordManager orupdate repeatpasswords to beuniquepassphraseSend questionabout trainingtopic tosecops@politicoAll teammembersare playingbingoEnable TwoFactor/ Multi-factor onpersonalaccountsReadPOLITICOarticlerelating tocybersecurityWatchrecordedsession ofCybersecurityBrown BagDelete appsyou no longeruse (phone,computer,tablet)Complete 3Cybersecuritycourses inPOLITICOUniversityVerifydeviceson homenetworkReportphish(not spam) tocyberdesk@politicoReceiveexternaldocument(s)shared toBoxAttend livesession ofCybersecurityBrown BagSharefolder/file withcolleaguethrough BoxlinkDon’t clickPOLITICOphishemailsParticipate inCybersecuritygame (notBingo)Collaborate ondocumentthrough Box inweb browserAttend livesession ofCybersecurityBrown BagWatch YouTubevideo ‘HowEasy It Is ToCrack YourPassword, WithKevin Mitnick’Data hygiene-Deleteunneeded datafromE-mail and BoxCheck if your E-mail has beenincluded in abreach. Go to“Have I beenpwned” websiteand enter E-mail.RemovePOLITICOfiles from localmachine andstore in BoxSet yoursocial mediaaccounts toprivateRestart yourcomputer toensure securityupdates havebeen installedMake sureyour phoneand mobileapps are upto datePut passwordsin PasswordManager orupdate repeatpasswords to beuniquepassphraseSend questionabout trainingtopic tosecops@politicoAll teammembersare playingbingoEnable TwoFactor/ Multi-factor onpersonalaccountsReadPOLITICOarticlerelating tocybersecurityWatchrecordedsession ofCybersecurityBrown BagDelete appsyou no longeruse (phone,computer,tablet)Complete 3Cybersecuritycourses inPOLITICOUniversityVerifydeviceson homenetworkReportphish(not spam) tocyberdesk@politicoReceiveexternaldocument(s)shared toBoxAttend livesession ofCybersecurityBrown Bag

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
B
2
B
3
I
4
G
5
I
6
I
7
B
8
G
9
O
10
B
11
N
12
I
13
I
14
G
15
O
16
N
17
B
18
O
19
G
20
O
21
N
22
N
23
G
24
O
  1. B-Share folder/file with colleague through Box link
  2. B-Don’t click POLITICO phish emails
  3. I-Participate in Cybersecurity game (not Bingo)
  4. G-Collaborate on document through Box in web browser
  5. I-Attend live session of Cybersecurity Brown Bag
  6. I-Watch YouTube video ‘How Easy It Is To Crack Your Password, With Kevin Mitnick’
  7. B-Data hygiene- Delete unneeded data from E-mail and Box
  8. G-Check if your E-mail has been included in a breach. Go to “Have I been pwned” website and enter E-mail.
  9. O-Remove POLITICO files from local machine and store in Box
  10. B-Set your social media accounts to private
  11. N-Restart your computer to ensure security updates have been installed
  12. I-Make sure your phone and mobile apps are up to date
  13. I-Put passwords in Password Manager or update repeat passwords to be unique passphrase
  14. G-Send question about training topic to secops@politico
  15. O-All team members are playing bingo
  16. N-Enable Two Factor/ Multi-factor on personal accounts
  17. B-Read POLITICO article relating to cybersecurity
  18. O-Watch recorded session of Cybersecurity Brown Bag
  19. G-Delete apps you no longer use (phone, computer, tablet)
  20. O-Complete 3 Cybersecurity courses in POLITICO University
  21. N-Verify devices on home network
  22. N-Report phish (not spam) to cyberdesk@politico
  23. G-Receive external document(s) shared to Box
  24. O-Attend live session of Cybersecurity Brown Bag