Sharefolder/file withcolleaguethrough BoxlinkWatch YouTubevideo ‘HowEasy It Is ToCrack YourPassword, WithKevin Mitnick’Complete 3Cybersecuritycourses inPOLITICOUniversityEnable TwoFactor/ Multi-factor onpersonalaccountsSet yoursocial mediaaccounts toprivateSend questionabout trainingtopic tosecops@politicoDon’t clickPOLITICOphishemailsCheck if your E-mail has beenincluded in abreach. Go to“Have I beenpwned” websiteand enter E-mail.Collaborate ondocumentthrough Box inweb browserWatchrecordedsession ofCybersecurityBrown BagAttend livesession ofCybersecurityBrown BagPut passwordsin PasswordManager orupdate repeatpasswords to beuniquepassphraseRemovePOLITICOfiles from localmachine andstore in BoxRestart yourcomputer toensure securityupdates havebeen installedReportphish(not spam) tocyberdesk@politicoVerifydeviceson homenetworkDelete appsyou no longeruse (phone,computer,tablet)Data hygiene-Deleteunneeded datafromE-mail and BoxReceiveexternaldocument(s)shared toBoxAll teammembersare playingbingoReadPOLITICOarticlerelating tocybersecurityParticipate inCybersecuritygame (notBingo)Make sureyour phoneand mobileapps are upto dateAttend livesession ofCybersecurityBrown BagSharefolder/file withcolleaguethrough BoxlinkWatch YouTubevideo ‘HowEasy It Is ToCrack YourPassword, WithKevin Mitnick’Complete 3Cybersecuritycourses inPOLITICOUniversityEnable TwoFactor/ Multi-factor onpersonalaccountsSet yoursocial mediaaccounts toprivateSend questionabout trainingtopic tosecops@politicoDon’t clickPOLITICOphishemailsCheck if your E-mail has beenincluded in abreach. Go to“Have I beenpwned” websiteand enter E-mail.Collaborate ondocumentthrough Box inweb browserWatchrecordedsession ofCybersecurityBrown BagAttend livesession ofCybersecurityBrown BagPut passwordsin PasswordManager orupdate repeatpasswords to beuniquepassphraseRemovePOLITICOfiles from localmachine andstore in BoxRestart yourcomputer toensure securityupdates havebeen installedReportphish(not spam) tocyberdesk@politicoVerifydeviceson homenetworkDelete appsyou no longeruse (phone,computer,tablet)Data hygiene-Deleteunneeded datafromE-mail and BoxReceiveexternaldocument(s)shared toBoxAll teammembersare playingbingoReadPOLITICOarticlerelating tocybersecurityParticipate inCybersecuritygame (notBingo)Make sureyour phoneand mobileapps are upto dateAttend livesession ofCybersecurityBrown Bag

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
B
2
I
3
O
4
N
5
B
6
G
7
B
8
G
9
G
10
O
11
O
12
I
13
O
14
N
15
N
16
N
17
G
18
B
19
G
20
O
21
B
22
I
23
I
24
I
  1. B-Share folder/file with colleague through Box link
  2. I-Watch YouTube video ‘How Easy It Is To Crack Your Password, With Kevin Mitnick’
  3. O-Complete 3 Cybersecurity courses in POLITICO University
  4. N-Enable Two Factor/ Multi-factor on personal accounts
  5. B-Set your social media accounts to private
  6. G-Send question about training topic to secops@politico
  7. B-Don’t click POLITICO phish emails
  8. G-Check if your E-mail has been included in a breach. Go to “Have I been pwned” website and enter E-mail.
  9. G-Collaborate on document through Box in web browser
  10. O-Watch recorded session of Cybersecurity Brown Bag
  11. O-Attend live session of Cybersecurity Brown Bag
  12. I-Put passwords in Password Manager or update repeat passwords to be unique passphrase
  13. O-Remove POLITICO files from local machine and store in Box
  14. N-Restart your computer to ensure security updates have been installed
  15. N-Report phish (not spam) to cyberdesk@politico
  16. N-Verify devices on home network
  17. G-Delete apps you no longer use (phone, computer, tablet)
  18. B-Data hygiene- Delete unneeded data from E-mail and Box
  19. G-Receive external document(s) shared to Box
  20. O-All team members are playing bingo
  21. B-Read POLITICO article relating to cybersecurity
  22. I-Participate in Cybersecurity game (not Bingo)
  23. I-Make sure your phone and mobile apps are up to date
  24. I-Attend live session of Cybersecurity Brown Bag