(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
Stayed vigilant to block any security breaches
Only used company approved tools and software
Kept separate personal and professional files
Used privacy screens to keep prying eyes at bay
Kept my desk spotless and secret-free
Verified emails with the precision of Sherlock Holmes
Checked URLs carefully to avoid fake websites
Downloaded files only from trusted sources
Encrypted sensitive files like a data magician
Used a VPN to stay safe on public Wi-Fi
Conjured up passwords so strong even Ninjas would be impressed
Kept software fresh and fierce with the lates updates
Browsed incognito like a secret agent
Activated two-factor authentication like a Security Star
Checked app permissions
Locked up the computer faster than a spy in a movie
Wore my access card in the office
Caught a sneaky phish and reported it
Discussed important security matters with a colleague
Used an authenticator app for enhanced security
Swept away old apps on my devices, like a digital Marie Kondo
Stayed curious and questioned (almost) everything
Reported any suspicious activity to the relevant authorities
Attended a security talk and lived to tell the tale