Locked upthe computerfaster than aspy in amovieDiscussedimportantsecuritymatters witha colleagueUsed privacyscreens tokeep pryingeyes at bayActivated two-factorauthenticationlike a SecurityStarProtectedthe castle byavoidingshadywebsitesUsed anauthenticatorapp forenhancedsecurityWore myaccesscard inthe officeStayedcurious andquestioned(almost)everythingSwept awayold apps onmy devices,like a digitalMarie KondoCheckedapppermissionsStayedvigilant toblock anysecuritybreachesConjured uppasswords sostrong evenNinjas wouldbe impressedBrowsedincognitolike a secretagentVerifiedemails withthe precisionof SherlockHolmesAttended asecurity talkand lived totell the taleCaught asneakyphish andreported itFound anddeletedunnecessaryold filesKeptseparatepersonal andprofessionalfilesUsed aVPN to staysafe onpublic Wi-FiReported anysuspiciousactivity to therelevantauthoritiesDownloadedfiles onlyfrom trustedsourcesEncryptedsensitivefiles like adatamagicianKept mydeskspotless andsecret-freeCheckedURLscarefully toavoid fakewebsitesKept softwarefresh andfierce withthe latesupdatesOnly usedcompanyapprovedtools andsoftwareLocked upthe computerfaster than aspy in amovieDiscussedimportantsecuritymatters witha colleagueUsed privacyscreens tokeep pryingeyes at bayActivated two-factorauthenticationlike a SecurityStarProtectedthe castle byavoidingshadywebsitesUsed anauthenticatorapp forenhancedsecurityWore myaccesscard inthe officeStayedcurious andquestioned(almost)everythingSwept awayold apps onmy devices,like a digitalMarie KondoCheckedapppermissionsStayedvigilant toblock anysecuritybreachesConjured uppasswords sostrong evenNinjas wouldbe impressedBrowsedincognitolike a secretagentVerifiedemails withthe precisionof SherlockHolmesAttended asecurity talkand lived totell the taleCaught asneakyphish andreported itFound anddeletedunnecessaryold filesKeptseparatepersonal andprofessionalfilesUsed aVPN to staysafe onpublic Wi-FiReported anysuspiciousactivity to therelevantauthoritiesDownloadedfiles onlyfrom trustedsourcesEncryptedsensitivefiles like adatamagicianKept mydeskspotless andsecret-freeCheckedURLscarefully toavoid fakewebsitesKept softwarefresh andfierce withthe latesupdatesOnly usedcompanyapprovedtools andsoftware

Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
  1. Locked up the computer faster than a spy in a movie
  2. Discussed important security matters with a colleague
  3. Used privacy screens to keep prying eyes at bay
  4. Activated two-factor authentication like a Security Star
  5. Protected the castle by avoiding shady websites
  6. Used an authenticator app for enhanced security
  7. Wore my access card in the office
  8. Stayed curious and questioned (almost) everything
  9. Swept away old apps on my devices, like a digital Marie Kondo
  10. Checked app permissions
  11. Stayed vigilant to block any security breaches
  12. Conjured up passwords so strong even Ninjas would be impressed
  13. Browsed incognito like a secret agent
  14. Verified emails with the precision of Sherlock Holmes
  15. Attended a security talk and lived to tell the tale
  16. Caught a sneaky phish and reported it
  17. Found and deleted unnecessary old files
  18. Kept separate personal and professional files
  19. Used a VPN to stay safe on public Wi-Fi
  20. Reported any suspicious activity to the relevant authorities
  21. Downloaded files only from trusted sources
  22. Encrypted sensitive files like a data magician
  23. Kept my desk spotless and secret-free
  24. Checked URLs carefully to avoid fake websites
  25. Kept software fresh and fierce with the lates updates
  26. Only used company approved tools and software