Joins privateor secretonlinegroupsUses weakpasswordsor the samepasswordeverywhereChild hasa secretaccountReceivesmessagesfromstrangersReceivesgifts fromunknownonlinefriendsUsessocialmedia lateat nightEngagesin onlinechallengesor daresHides phoneor screenwhen parentsenter theroomAvoids onlineactivitieswhen parentsare aroundSpends moneyon in-apppurchaseswithoutpermissionTries tomeet onlinefriends inreal lifeSharespersonalinformationonlineScreensin thebedroomUses aVPN tohideactivityFollowsinfluencerswho promoteriskybehaviorsUsesdisappearingmessageapps (e.g.,Snapchat)Showssudden moodchanges afterusing devicesExcessivegamingWatchesage-inappropriatecontentIgnores real-liferesponsibilitiesdue to onlineactivitiesDeletesmessagesor browsinghistoryGetsdefensivewhen askedabout onlineactivityGets upsetwhen askedto stop usingdevicesTalks aboutonline friendsthey’ve nevermet in personJoins privateor secretonlinegroupsUses weakpasswordsor the samepasswordeverywhereChild hasa secretaccountReceivesmessagesfromstrangersReceivesgifts fromunknownonlinefriendsUsessocialmedia lateat nightEngagesin onlinechallengesor daresHides phoneor screenwhen parentsenter theroomAvoids onlineactivitieswhen parentsare aroundSpends moneyon in-apppurchaseswithoutpermissionTries tomeet onlinefriends inreal lifeSharespersonalinformationonlineScreensin thebedroomUses aVPN tohideactivityFollowsinfluencerswho promoteriskybehaviorsUsesdisappearingmessageapps (e.g.,Snapchat)Showssudden moodchanges afterusing devicesExcessivegamingWatchesage-inappropriatecontentIgnores real-liferesponsibilitiesdue to onlineactivitiesDeletesmessagesor browsinghistoryGetsdefensivewhen askedabout onlineactivityGets upsetwhen askedto stop usingdevicesTalks aboutonline friendsthey’ve nevermet in person

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Joins private or secret online groups
  2. Uses weak passwords or the same password everywhere
  3. Child has a secret account
  4. Receives messages from strangers
  5. Receives gifts from unknown online friends
  6. Uses social media late at night
  7. Engages in online challenges or dares
  8. Hides phone or screen when parents enter the room
  9. Avoids online activities when parents are around
  10. Spends money on in-app purchases without permission
  11. Tries to meet online friends in real life
  12. Shares personal information online
  13. Screens in the bedroom
  14. Uses a VPN to hide activity
  15. Follows influencers who promote risky behaviors
  16. Uses disappearing message apps (e.g., Snapchat)
  17. Shows sudden mood changes after using devices
  18. Excessive gaming
  19. Watches age-inappropriate content
  20. Ignores real-life responsibilities due to online activities
  21. Deletes messages or browsing history
  22. Gets defensive when asked about online activity
  23. Gets upset when asked to stop using devices
  24. Talks about online friends they’ve never met in person