Stayedvigilant toblock anysecuritybreachesOnly usedcompanyapprovedtools andsoftwareKeptseparatepersonal andprofessionalfilesUsed privacyscreens tokeep pryingeyes at bayKept mydeskspotless andsecret-freeVerifiedemails withthe precisionof SherlockHolmesCheckedURLscarefully toavoid fakewebsitesDownloadedfiles onlyfrom trustedsourcesEncryptedsensitivefiles like adatamagicianUsed aVPN to staysafe onpublic Wi-FiConjured uppasswords sostrong evenNinjas wouldbe impressedKept softwarefresh andfierce withthe latesupdatesBrowsedincognitolike a secretagentActivated two-factorauthenticationlike a SecurityStarCheckedapppermissionsLocked upthe computerfaster than aspy in amovieWore myaccesscard inthe officeCaught asneakyphish andreported itDiscussedimportantsecuritymatters witha colleagueUsed anauthenticatorapp forenhancedsecuritySwept awayold apps onmy devices,like a digitalMarie KondoStayedcurious andquestioned(almost)everythingReported anysuspiciousactivity to therelevantauthoritiesAttended asecurity talkand lived totell the taleProtectedthe castle byavoidingshadywebsitesFound anddeletedunnecessaryold filesStayedvigilant toblock anysecuritybreachesOnly usedcompanyapprovedtools andsoftwareKeptseparatepersonal andprofessionalfilesUsed privacyscreens tokeep pryingeyes at bayKept mydeskspotless andsecret-freeVerifiedemails withthe precisionof SherlockHolmesCheckedURLscarefully toavoid fakewebsitesDownloadedfiles onlyfrom trustedsourcesEncryptedsensitivefiles like adatamagicianUsed aVPN to staysafe onpublic Wi-FiConjured uppasswords sostrong evenNinjas wouldbe impressedKept softwarefresh andfierce withthe latesupdatesBrowsedincognitolike a secretagentActivated two-factorauthenticationlike a SecurityStarCheckedapppermissionsLocked upthe computerfaster than aspy in amovieWore myaccesscard inthe officeCaught asneakyphish andreported itDiscussedimportantsecuritymatters witha colleagueUsed anauthenticatorapp forenhancedsecuritySwept awayold apps onmy devices,like a digitalMarie KondoStayedcurious andquestioned(almost)everythingReported anysuspiciousactivity to therelevantauthoritiesAttended asecurity talkand lived totell the taleProtectedthe castle byavoidingshadywebsitesFound anddeletedunnecessaryold files

Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
  1. Stayed vigilant to block any security breaches
  2. Only used company approved tools and software
  3. Kept separate personal and professional files
  4. Used privacy screens to keep prying eyes at bay
  5. Kept my desk spotless and secret-free
  6. Verified emails with the precision of Sherlock Holmes
  7. Checked URLs carefully to avoid fake websites
  8. Downloaded files only from trusted sources
  9. Encrypted sensitive files like a data magician
  10. Used a VPN to stay safe on public Wi-Fi
  11. Conjured up passwords so strong even Ninjas would be impressed
  12. Kept software fresh and fierce with the lates updates
  13. Browsed incognito like a secret agent
  14. Activated two-factor authentication like a Security Star
  15. Checked app permissions
  16. Locked up the computer faster than a spy in a movie
  17. Wore my access card in the office
  18. Caught a sneaky phish and reported it
  19. Discussed important security matters with a colleague
  20. Used an authenticator app for enhanced security
  21. Swept away old apps on my devices, like a digital Marie Kondo
  22. Stayed curious and questioned (almost) everything
  23. Reported any suspicious activity to the relevant authorities
  24. Attended a security talk and lived to tell the tale
  25. Protected the castle by avoiding shady websites
  26. Found and deleted unnecessary old files