Be aware of shoulder surfing Secure your Wi-Fi Report a data breach Use multi- factor authentication Use strong passwords Double-check recipient before sending emails Use a password manager Log out of unused accounts Avoid public Wi-Fi for sensitive tasks Delete old accounts Be cautious of email attachments Lock you filing cabinet Store donor information securely Report a phishing email Review who has access to shared files Use secure file sharing methods Verify email sender before clicking links Update your password Back up your data Clear your browser cache Check for software updates Shred sensitive documents Lock your screen Avoid oversharing personal information Be aware of shoulder surfing Secure your Wi-Fi Report a data breach Use multi- factor authentication Use strong passwords Double-check recipient before sending emails Use a password manager Log out of unused accounts Avoid public Wi-Fi for sensitive tasks Delete old accounts Be cautious of email attachments Lock you filing cabinet Store donor information securely Report a phishing email Review who has access to shared files Use secure file sharing methods Verify email sender before clicking links Update your password Back up your data Clear your browser cache Check for software updates Shred sensitive documents Lock your screen Avoid oversharing personal information
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Be aware of shoulder surfing
Secure your Wi-Fi
Report a data breach
Use multi-factor authentication
Use strong passwords
Double-check recipient before sending emails
Use a password manager
Log out of unused accounts
Avoid public Wi-Fi for sensitive tasks
Delete old accounts
Be cautious of email attachments
Lock you filing cabinet
Store donor information securely
Report a phishing email
Review who has access to shared files
Use secure file sharing methods
Verify email sender before clicking links
Update your password
Back up your data
Clear your browser cache
Check for software updates
Shred sensitive documents
Lock your screen
Avoid oversharing personal information