Stayedcurious andquestioned(almost)everythingLocked upthe computerfaster than aspy in amovieKept softwarefresh andfierce withthe latesupdatesCaught asneakyphish andreported itActivated two-factorauthenticationlike a SecurityStarConjured uppasswords sostrong evenNinjas wouldbe impressedDiscussedimportantsecuritymatters witha colleagueWore myaccesscard inthe officeUsed anauthenticatorapp forenhancedsecurityVerifiedemails withthe precisionof SherlockHolmesUsed aVPN to staysafe onpublic Wi-FiBrowsedincognitolike a secretagentKeptseparatepersonal andprofessionalfilesEncryptedsensitivefiles like adatamagicianReported anysuspiciousactivity to therelevantauthoritiesUsed privacyscreens tokeep pryingeyes at bayFound anddeletedunnecessaryold filesKept mydeskspotless andsecret-freeDownloadedfiles onlyfrom trustedsourcesProtectedthe castle byavoidingshadywebsitesOnly usedcompanyapprovedtools andsoftwareCheckedapppermissionsCheckedURLscarefully toavoid fakewebsitesSwept awayold apps onmy devices,like a digitalMarie KondoStayedvigilant toblock anysecuritybreachesAttended asecurity talkand lived totell the taleStayedcurious andquestioned(almost)everythingLocked upthe computerfaster than aspy in amovieKept softwarefresh andfierce withthe latesupdatesCaught asneakyphish andreported itActivated two-factorauthenticationlike a SecurityStarConjured uppasswords sostrong evenNinjas wouldbe impressedDiscussedimportantsecuritymatters witha colleagueWore myaccesscard inthe officeUsed anauthenticatorapp forenhancedsecurityVerifiedemails withthe precisionof SherlockHolmesUsed aVPN to staysafe onpublic Wi-FiBrowsedincognitolike a secretagentKeptseparatepersonal andprofessionalfilesEncryptedsensitivefiles like adatamagicianReported anysuspiciousactivity to therelevantauthoritiesUsed privacyscreens tokeep pryingeyes at bayFound anddeletedunnecessaryold filesKept mydeskspotless andsecret-freeDownloadedfiles onlyfrom trustedsourcesProtectedthe castle byavoidingshadywebsitesOnly usedcompanyapprovedtools andsoftwareCheckedapppermissionsCheckedURLscarefully toavoid fakewebsitesSwept awayold apps onmy devices,like a digitalMarie KondoStayedvigilant toblock anysecuritybreachesAttended asecurity talkand lived totell the tale

Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
  1. Stayed curious and questioned (almost) everything
  2. Locked up the computer faster than a spy in a movie
  3. Kept software fresh and fierce with the lates updates
  4. Caught a sneaky phish and reported it
  5. Activated two-factor authentication like a Security Star
  6. Conjured up passwords so strong even Ninjas would be impressed
  7. Discussed important security matters with a colleague
  8. Wore my access card in the office
  9. Used an authenticator app for enhanced security
  10. Verified emails with the precision of Sherlock Holmes
  11. Used a VPN to stay safe on public Wi-Fi
  12. Browsed incognito like a secret agent
  13. Kept separate personal and professional files
  14. Encrypted sensitive files like a data magician
  15. Reported any suspicious activity to the relevant authorities
  16. Used privacy screens to keep prying eyes at bay
  17. Found and deleted unnecessary old files
  18. Kept my desk spotless and secret-free
  19. Downloaded files only from trusted sources
  20. Protected the castle by avoiding shady websites
  21. Only used company approved tools and software
  22. Checked app permissions
  23. Checked URLs carefully to avoid fake websites
  24. Swept away old apps on my devices, like a digital Marie Kondo
  25. Stayed vigilant to block any security breaches
  26. Attended a security talk and lived to tell the tale