Followsinfluencerswho promoteriskybehaviorsUses aVPN tohideactivityUsesdisappearingmessageapps (e.g.,Snapchat)ReceivesmessagesfromstrangersEngagesin onlinechallengesor daresChild hasa secretaccountIgnores real-liferesponsibilitiesdue to onlineactivitiesTries tomeet onlinefriends inreal lifeAvoids onlineactivitieswhen parentsare aroundSharespersonalinformationonlineTalks aboutonline friendsthey’ve nevermet in personSpends moneyon in-apppurchaseswithoutpermissionWatchesage-inappropriatecontentDeletesmessagesor browsinghistoryGets upsetwhen askedto stop usingdevicesScreensin thebedroomUsessocialmedia lateat nightHides phoneor screenwhen parentsenter theroomGetsdefensivewhen askedabout onlineactivityJoins privateor secretonlinegroupsShowssudden moodchanges afterusing devicesUses weakpasswordsor the samepasswordeverywhereExcessivegamingReceivesgifts fromunknownonlinefriendsFollowsinfluencerswho promoteriskybehaviorsUses aVPN tohideactivityUsesdisappearingmessageapps (e.g.,Snapchat)ReceivesmessagesfromstrangersEngagesin onlinechallengesor daresChild hasa secretaccountIgnores real-liferesponsibilitiesdue to onlineactivitiesTries tomeet onlinefriends inreal lifeAvoids onlineactivitieswhen parentsare aroundSharespersonalinformationonlineTalks aboutonline friendsthey’ve nevermet in personSpends moneyon in-apppurchaseswithoutpermissionWatchesage-inappropriatecontentDeletesmessagesor browsinghistoryGets upsetwhen askedto stop usingdevicesScreensin thebedroomUsessocialmedia lateat nightHides phoneor screenwhen parentsenter theroomGetsdefensivewhen askedabout onlineactivityJoins privateor secretonlinegroupsShowssudden moodchanges afterusing devicesUses weakpasswordsor the samepasswordeverywhereExcessivegamingReceivesgifts fromunknownonlinefriends

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Follows influencers who promote risky behaviors
  2. Uses a VPN to hide activity
  3. Uses disappearing message apps (e.g., Snapchat)
  4. Receives messages from strangers
  5. Engages in online challenges or dares
  6. Child has a secret account
  7. Ignores real-life responsibilities due to online activities
  8. Tries to meet online friends in real life
  9. Avoids online activities when parents are around
  10. Shares personal information online
  11. Talks about online friends they’ve never met in person
  12. Spends money on in-app purchases without permission
  13. Watches age-inappropriate content
  14. Deletes messages or browsing history
  15. Gets upset when asked to stop using devices
  16. Screens in the bedroom
  17. Uses social media late at night
  18. Hides phone or screen when parents enter the room
  19. Gets defensive when asked about online activity
  20. Joins private or secret online groups
  21. Shows sudden mood changes after using devices
  22. Uses weak passwords or the same password everywhere
  23. Excessive gaming
  24. Receives gifts from unknown online friends