Getsdefensivewhen askedabout onlineactivityUsessocialmedia lateat nightUses weakpasswordsor the samepasswordeverywhereIgnores real-liferesponsibilitiesdue to onlineactivitiesDeletesmessagesor browsinghistoryReceivesgifts fromunknownonlinefriendsReceivesmessagesfromstrangersUses aVPN tohideactivitySpends moneyon in-apppurchaseswithoutpermissionHides phoneor screenwhen parentsenter theroomTalks aboutonline friendsthey’ve nevermet in personTries tomeet onlinefriends inreal lifeEngagesin onlinechallengesor daresExcessivegamingWatchesage-inappropriatecontentGets upsetwhen askedto stop usingdevicesScreensin thebedroomSharespersonalinformationonlineShowssudden moodchanges afterusing devicesFollowsinfluencerswho promoteriskybehaviorsJoins privateor secretonlinegroupsAvoids onlineactivitieswhen parentsare aroundChild hasa secretaccountUsesdisappearingmessageapps (e.g.,Snapchat)Getsdefensivewhen askedabout onlineactivityUsessocialmedia lateat nightUses weakpasswordsor the samepasswordeverywhereIgnores real-liferesponsibilitiesdue to onlineactivitiesDeletesmessagesor browsinghistoryReceivesgifts fromunknownonlinefriendsReceivesmessagesfromstrangersUses aVPN tohideactivitySpends moneyon in-apppurchaseswithoutpermissionHides phoneor screenwhen parentsenter theroomTalks aboutonline friendsthey’ve nevermet in personTries tomeet onlinefriends inreal lifeEngagesin onlinechallengesor daresExcessivegamingWatchesage-inappropriatecontentGets upsetwhen askedto stop usingdevicesScreensin thebedroomSharespersonalinformationonlineShowssudden moodchanges afterusing devicesFollowsinfluencerswho promoteriskybehaviorsJoins privateor secretonlinegroupsAvoids onlineactivitieswhen parentsare aroundChild hasa secretaccountUsesdisappearingmessageapps (e.g.,Snapchat)

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Gets defensive when asked about online activity
  2. Uses social media late at night
  3. Uses weak passwords or the same password everywhere
  4. Ignores real-life responsibilities due to online activities
  5. Deletes messages or browsing history
  6. Receives gifts from unknown online friends
  7. Receives messages from strangers
  8. Uses a VPN to hide activity
  9. Spends money on in-app purchases without permission
  10. Hides phone or screen when parents enter the room
  11. Talks about online friends they’ve never met in person
  12. Tries to meet online friends in real life
  13. Engages in online challenges or dares
  14. Excessive gaming
  15. Watches age-inappropriate content
  16. Gets upset when asked to stop using devices
  17. Screens in the bedroom
  18. Shares personal information online
  19. Shows sudden mood changes after using devices
  20. Follows influencers who promote risky behaviors
  21. Joins private or secret online groups
  22. Avoids online activities when parents are around
  23. Child has a secret account
  24. Uses disappearing message apps (e.g., Snapchat)