Downloadedfiles onlyfrom trustedsourcesBrowsedincognitolike a secretagentSwept awayold apps onmy devices,like a digitalMarie KondoReported anysuspiciousactivity to therelevantauthoritiesUsed aVPN to staysafe onpublic Wi-FiDiscussedimportantsecuritymatters witha colleagueStayedcurious andquestioned(almost)everythingKept mydeskspotless andsecret-freeUsed privacyscreens tokeep pryingeyes at bayCheckedURLscarefully toavoid fakewebsitesProtectedthe castle byavoidingshadywebsitesStayedvigilant toblock anysecuritybreachesKept softwarefresh andfierce withthe latesupdatesVerifiedemails withthe precisionof SherlockHolmesWore myaccesscard inthe officeAttended asecurity talkand lived totell the taleFound anddeletedunnecessaryold filesEncryptedsensitivefiles like adatamagicianCheckedapppermissionsCaught asneakyphish andreported itUsed anauthenticatorapp forenhancedsecurityKeptseparatepersonal andprofessionalfilesConjured uppasswords sostrong evenNinjas wouldbe impressedOnly usedcompanyapprovedtools andsoftwareActivated two-factorauthenticationlike a SecurityStarLocked upthe computerfaster than aspy in amovieDownloadedfiles onlyfrom trustedsourcesBrowsedincognitolike a secretagentSwept awayold apps onmy devices,like a digitalMarie KondoReported anysuspiciousactivity to therelevantauthoritiesUsed aVPN to staysafe onpublic Wi-FiDiscussedimportantsecuritymatters witha colleagueStayedcurious andquestioned(almost)everythingKept mydeskspotless andsecret-freeUsed privacyscreens tokeep pryingeyes at bayCheckedURLscarefully toavoid fakewebsitesProtectedthe castle byavoidingshadywebsitesStayedvigilant toblock anysecuritybreachesKept softwarefresh andfierce withthe latesupdatesVerifiedemails withthe precisionof SherlockHolmesWore myaccesscard inthe officeAttended asecurity talkand lived totell the taleFound anddeletedunnecessaryold filesEncryptedsensitivefiles like adatamagicianCheckedapppermissionsCaught asneakyphish andreported itUsed anauthenticatorapp forenhancedsecurityKeptseparatepersonal andprofessionalfilesConjured uppasswords sostrong evenNinjas wouldbe impressedOnly usedcompanyapprovedtools andsoftwareActivated two-factorauthenticationlike a SecurityStarLocked upthe computerfaster than aspy in amovie

Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
  1. Downloaded files only from trusted sources
  2. Browsed incognito like a secret agent
  3. Swept away old apps on my devices, like a digital Marie Kondo
  4. Reported any suspicious activity to the relevant authorities
  5. Used a VPN to stay safe on public Wi-Fi
  6. Discussed important security matters with a colleague
  7. Stayed curious and questioned (almost) everything
  8. Kept my desk spotless and secret-free
  9. Used privacy screens to keep prying eyes at bay
  10. Checked URLs carefully to avoid fake websites
  11. Protected the castle by avoiding shady websites
  12. Stayed vigilant to block any security breaches
  13. Kept software fresh and fierce with the lates updates
  14. Verified emails with the precision of Sherlock Holmes
  15. Wore my access card in the office
  16. Attended a security talk and lived to tell the tale
  17. Found and deleted unnecessary old files
  18. Encrypted sensitive files like a data magician
  19. Checked app permissions
  20. Caught a sneaky phish and reported it
  21. Used an authenticator app for enhanced security
  22. Kept separate personal and professional files
  23. Conjured up passwords so strong even Ninjas would be impressed
  24. Only used company approved tools and software
  25. Activated two-factor authentication like a Security Star
  26. Locked up the computer faster than a spy in a movie