Stayedcurious andquestioned(almost)everythingKept mydeskspotless andsecret-freeKept softwarefresh andfierce withthe latesupdatesDiscussedimportantsecuritymatters witha colleagueBrowsedincognitolike a secretagentUsed privacyscreens tokeep pryingeyes at bayOnly usedcompanyapprovedtools andsoftwareWore myaccesscard inthe officeProtectedthe castle byavoidingshadywebsitesCheckedapppermissionsAttended asecurity talkand lived totell the taleEncryptedsensitivefiles like adatamagicianSwept awayold apps onmy devices,like a digitalMarie KondoReported anysuspiciousactivity to therelevantauthoritiesDownloadedfiles onlyfrom trustedsourcesFound anddeletedunnecessaryold filesActivated two-factorauthenticationlike a SecurityStarCheckedURLscarefully toavoid fakewebsitesVerifiedemails withthe precisionof SherlockHolmesCaught asneakyphish andreported itLocked upthe computerfaster than aspy in amovieUsed aVPN to staysafe onpublic Wi-FiConjured uppasswords sostrong evenNinjas wouldbe impressedKeptseparatepersonal andprofessionalfilesUsed anauthenticatorapp forenhancedsecurityStayedvigilant toblock anysecuritybreachesStayedcurious andquestioned(almost)everythingKept mydeskspotless andsecret-freeKept softwarefresh andfierce withthe latesupdatesDiscussedimportantsecuritymatters witha colleagueBrowsedincognitolike a secretagentUsed privacyscreens tokeep pryingeyes at bayOnly usedcompanyapprovedtools andsoftwareWore myaccesscard inthe officeProtectedthe castle byavoidingshadywebsitesCheckedapppermissionsAttended asecurity talkand lived totell the taleEncryptedsensitivefiles like adatamagicianSwept awayold apps onmy devices,like a digitalMarie KondoReported anysuspiciousactivity to therelevantauthoritiesDownloadedfiles onlyfrom trustedsourcesFound anddeletedunnecessaryold filesActivated two-factorauthenticationlike a SecurityStarCheckedURLscarefully toavoid fakewebsitesVerifiedemails withthe precisionof SherlockHolmesCaught asneakyphish andreported itLocked upthe computerfaster than aspy in amovieUsed aVPN to staysafe onpublic Wi-FiConjured uppasswords sostrong evenNinjas wouldbe impressedKeptseparatepersonal andprofessionalfilesUsed anauthenticatorapp forenhancedsecurityStayedvigilant toblock anysecuritybreaches

Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
  1. Stayed curious and questioned (almost) everything
  2. Kept my desk spotless and secret-free
  3. Kept software fresh and fierce with the lates updates
  4. Discussed important security matters with a colleague
  5. Browsed incognito like a secret agent
  6. Used privacy screens to keep prying eyes at bay
  7. Only used company approved tools and software
  8. Wore my access card in the office
  9. Protected the castle by avoiding shady websites
  10. Checked app permissions
  11. Attended a security talk and lived to tell the tale
  12. Encrypted sensitive files like a data magician
  13. Swept away old apps on my devices, like a digital Marie Kondo
  14. Reported any suspicious activity to the relevant authorities
  15. Downloaded files only from trusted sources
  16. Found and deleted unnecessary old files
  17. Activated two-factor authentication like a Security Star
  18. Checked URLs carefully to avoid fake websites
  19. Verified emails with the precision of Sherlock Holmes
  20. Caught a sneaky phish and reported it
  21. Locked up the computer faster than a spy in a movie
  22. Used a VPN to stay safe on public Wi-Fi
  23. Conjured up passwords so strong even Ninjas would be impressed
  24. Kept separate personal and professional files
  25. Used an authenticator app for enhanced security
  26. Stayed vigilant to block any security breaches