Downloadedfiles onlyfrom trustedsourcesBrowsedincognitolike a secretagentCaught asneakyphish andreported itActivated two-factorauthenticationlike a SecurityStarKept mydeskspotless andsecret-freeStayedvigilant toblock anysecuritybreachesDiscussedimportantsecuritymatters witha colleagueCheckedapppermissionsWore myaccesscard inthe officeAttended asecurity talkand lived totell the taleUsed privacyscreens tokeep pryingeyes at bayKept softwarefresh andfierce withthe latesupdatesStayedcurious andquestioned(almost)everythingProtectedthe castle byavoidingshadywebsitesUsed anauthenticatorapp forenhancedsecurityConjured uppasswords sostrong evenNinjas wouldbe impressedLocked upthe computerfaster than aspy in amovieVerifiedemails withthe precisionof SherlockHolmesEncryptedsensitivefiles like adatamagicianReported anysuspiciousactivity to therelevantauthoritiesCheckedURLscarefully toavoid fakewebsitesOnly usedcompanyapprovedtools andsoftwareUsed aVPN to staysafe onpublic Wi-FiKeptseparatepersonal andprofessionalfilesFound anddeletedunnecessaryold filesSwept awayold apps onmy devices,like a digitalMarie KondoDownloadedfiles onlyfrom trustedsourcesBrowsedincognitolike a secretagentCaught asneakyphish andreported itActivated two-factorauthenticationlike a SecurityStarKept mydeskspotless andsecret-freeStayedvigilant toblock anysecuritybreachesDiscussedimportantsecuritymatters witha colleagueCheckedapppermissionsWore myaccesscard inthe officeAttended asecurity talkand lived totell the taleUsed privacyscreens tokeep pryingeyes at bayKept softwarefresh andfierce withthe latesupdatesStayedcurious andquestioned(almost)everythingProtectedthe castle byavoidingshadywebsitesUsed anauthenticatorapp forenhancedsecurityConjured uppasswords sostrong evenNinjas wouldbe impressedLocked upthe computerfaster than aspy in amovieVerifiedemails withthe precisionof SherlockHolmesEncryptedsensitivefiles like adatamagicianReported anysuspiciousactivity to therelevantauthoritiesCheckedURLscarefully toavoid fakewebsitesOnly usedcompanyapprovedtools andsoftwareUsed aVPN to staysafe onpublic Wi-FiKeptseparatepersonal andprofessionalfilesFound anddeletedunnecessaryold filesSwept awayold apps onmy devices,like a digitalMarie Kondo

Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
  1. Downloaded files only from trusted sources
  2. Browsed incognito like a secret agent
  3. Caught a sneaky phish and reported it
  4. Activated two-factor authentication like a Security Star
  5. Kept my desk spotless and secret-free
  6. Stayed vigilant to block any security breaches
  7. Discussed important security matters with a colleague
  8. Checked app permissions
  9. Wore my access card in the office
  10. Attended a security talk and lived to tell the tale
  11. Used privacy screens to keep prying eyes at bay
  12. Kept software fresh and fierce with the lates updates
  13. Stayed curious and questioned (almost) everything
  14. Protected the castle by avoiding shady websites
  15. Used an authenticator app for enhanced security
  16. Conjured up passwords so strong even Ninjas would be impressed
  17. Locked up the computer faster than a spy in a movie
  18. Verified emails with the precision of Sherlock Holmes
  19. Encrypted sensitive files like a data magician
  20. Reported any suspicious activity to the relevant authorities
  21. Checked URLs carefully to avoid fake websites
  22. Only used company approved tools and software
  23. Used a VPN to stay safe on public Wi-Fi
  24. Kept separate personal and professional files
  25. Found and deleted unnecessary old files
  26. Swept away old apps on my devices, like a digital Marie Kondo