Report a data breach Use secure file sharing methods Log out of unused accounts Use a password manager Back up your data Report a phishing email Be cautious of email attachments Shred sensitive documents Review who has access to shared files Lock your screen Use strong passwords Be aware of shoulder surfing Check for software updates Update your password Avoid public Wi-Fi for sensitive tasks Verify email sender before clicking links Use multi- factor authentication Double-check recipient before sending emails Clear your browser cache Store donor information securely Lock you filing cabinet Delete old accounts Avoid oversharing personal information Secure your Wi-Fi Report a data breach Use secure file sharing methods Log out of unused accounts Use a password manager Back up your data Report a phishing email Be cautious of email attachments Shred sensitive documents Review who has access to shared files Lock your screen Use strong passwords Be aware of shoulder surfing Check for software updates Update your password Avoid public Wi-Fi for sensitive tasks Verify email sender before clicking links Use multi- factor authentication Double-check recipient before sending emails Clear your browser cache Store donor information securely Lock you filing cabinet Delete old accounts Avoid oversharing personal information Secure your Wi-Fi
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Report a data breach
Use secure file sharing methods
Log out of unused accounts
Use a password manager
Back up your data
Report a phishing email
Be cautious of email attachments
Shred sensitive documents
Review who has access to shared files
Lock your screen
Use strong passwords
Be aware of shoulder surfing
Check for software updates
Update your password
Avoid public Wi-Fi for sensitive tasks
Verify email sender before clicking links
Use multi-factor authentication
Double-check recipient before sending emails
Clear your browser cache
Store donor information securely
Lock you filing cabinet
Delete old accounts
Avoid oversharing personal information
Secure your Wi-Fi