Conjured uppasswords sostrong evenNinjas wouldbe impressedKept softwarefresh andfierce withthe latesupdatesUsed anauthenticatorapp forenhancedsecurityBrowsedincognitolike a secretagentUsed aVPN to staysafe onpublic Wi-FiLocked upthe computerfaster than aspy in amovieSwept awayold apps onmy devices,like a digitalMarie KondoEncryptedsensitivefiles like adatamagicianCaught asneakyphish andreported itUsed privacyscreens tokeep pryingeyes at bayFound anddeletedunnecessaryold filesCheckedURLscarefully toavoid fakewebsitesActivated two-factorauthenticationlike a SecurityStarCheckedapppermissionsDiscussedimportantsecuritymatters witha colleagueAttended asecurity talkand lived totell the taleVerifiedemails withthe precisionof SherlockHolmesDownloadedfiles onlyfrom trustedsourcesKept mydeskspotless andsecret-freeStayedcurious andquestioned(almost)everythingOnly usedcompanyapprovedtools andsoftwareReported anysuspiciousactivity to therelevantauthoritiesKeptseparatepersonal andprofessionalfilesStayedvigilant toblock anysecuritybreachesWore myaccesscard inthe officeProtectedthe castle byavoidingshadywebsitesConjured uppasswords sostrong evenNinjas wouldbe impressedKept softwarefresh andfierce withthe latesupdatesUsed anauthenticatorapp forenhancedsecurityBrowsedincognitolike a secretagentUsed aVPN to staysafe onpublic Wi-FiLocked upthe computerfaster than aspy in amovieSwept awayold apps onmy devices,like a digitalMarie KondoEncryptedsensitivefiles like adatamagicianCaught asneakyphish andreported itUsed privacyscreens tokeep pryingeyes at bayFound anddeletedunnecessaryold filesCheckedURLscarefully toavoid fakewebsitesActivated two-factorauthenticationlike a SecurityStarCheckedapppermissionsDiscussedimportantsecuritymatters witha colleagueAttended asecurity talkand lived totell the taleVerifiedemails withthe precisionof SherlockHolmesDownloadedfiles onlyfrom trustedsourcesKept mydeskspotless andsecret-freeStayedcurious andquestioned(almost)everythingOnly usedcompanyapprovedtools andsoftwareReported anysuspiciousactivity to therelevantauthoritiesKeptseparatepersonal andprofessionalfilesStayedvigilant toblock anysecuritybreachesWore myaccesscard inthe officeProtectedthe castle byavoidingshadywebsites

Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
  1. Conjured up passwords so strong even Ninjas would be impressed
  2. Kept software fresh and fierce with the lates updates
  3. Used an authenticator app for enhanced security
  4. Browsed incognito like a secret agent
  5. Used a VPN to stay safe on public Wi-Fi
  6. Locked up the computer faster than a spy in a movie
  7. Swept away old apps on my devices, like a digital Marie Kondo
  8. Encrypted sensitive files like a data magician
  9. Caught a sneaky phish and reported it
  10. Used privacy screens to keep prying eyes at bay
  11. Found and deleted unnecessary old files
  12. Checked URLs carefully to avoid fake websites
  13. Activated two-factor authentication like a Security Star
  14. Checked app permissions
  15. Discussed important security matters with a colleague
  16. Attended a security talk and lived to tell the tale
  17. Verified emails with the precision of Sherlock Holmes
  18. Downloaded files only from trusted sources
  19. Kept my desk spotless and secret-free
  20. Stayed curious and questioned (almost) everything
  21. Only used company approved tools and software
  22. Reported any suspicious activity to the relevant authorities
  23. Kept separate personal and professional files
  24. Stayed vigilant to block any security breaches
  25. Wore my access card in the office
  26. Protected the castle by avoiding shady websites