This bingo card has a free space and 45 words: Authentication, Identify, Encryption, Decryption, Intrusion detection system (IDS), Intrusion prevention system (IPS), DMZ, Firewall, Ethernet, Internet service provider (ISP), Malware, Phishing, SharePoint, Threat, Vulnerability, Risk, Username, 2FA (Two factor authentication), Virtual private network (VPN), OneDrive, Wi-Fi, Microsoft 365, PII, Password, Router, Certificate, Data Breach, Vishing, Cyber, Security, Login, Malicious, Internet, Suspicious, Server, Email, Website, Personal, Responsibility, Information, Verify, Protected, Cloud, Click and Malicious.
⚠ This card has duplicate items: Malicious (2)
Cyber Bingo | Cyber Bingo | Cyber Bingo | Cyber Bingo | Cyber Bingo
Share this URL with your players:
For more control of your online game, create a clone of this card first.
Learn how to conduct a bingo game.
With players vying for a you'll have to call about __ items before someone wins. There's a __% chance that a lucky player would win after calling __ items.
Tip: If you want your game to last longer (on average), add more unique words/images to it.