SmishingFacebookMalwareDisableDeviceTLS1.2Wi-FiEthernetSmishingDecryptionSecurityPasswordSecurityinformationand eventmanagement(SIEM)ResponsibilityLoginInformationLegalOneDriveMulti-FactorAuthenticationOutlookClickPHIWebsiteExchangeRiskKnowBe4SuspiciousCertificatePhishingThreatCyberEmailIntrusionpreventionsystem(IPS)FirewallServerIntrusiondetectionsystem(IDS)VerifyDMZPIIEncryptionInstagramRouterCiscoPersonalVirtualprivatenetwork(VPN)UsernameWorkInternetDataBreachMobileSharePointMaliciousIntranetTwitterAuthentication2FA (Twofactorauthentication)ProtectedInternetserviceprovider(ISP)IdentifyVishingVulnerabilityVishingSmishingFacebookMalwareDisableDeviceTLS1.2Wi-FiEthernetSmishingDecryptionSecurityPasswordSecurityinformationand eventmanagement(SIEM)ResponsibilityLoginInformationLegalOneDriveMulti-FactorAuthenticationOutlookClickPHIWebsiteExchangeRiskKnowBe4SuspiciousCertificatePhishingThreatCyberEmailIntrusionpreventionsystem(IPS)FirewallServerIntrusiondetectionsystem(IDS)VerifyDMZPIIEncryptionInstagramRouterCiscoPersonalVirtualprivatenetwork(VPN)UsernameWorkInternetDataBreachMobileSharePointMaliciousIntranetTwitterAuthentication2FA (Twofactorauthentication)ProtectedInternetserviceprovider(ISP)IdentifyVishingVulnerabilityVishing

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
  1. Smishing
  2. Facebook
  3. Malware
  4. Disable
  5. Device
  6. TLS 1.2
  7. Wi-Fi
  8. Ethernet
  9. Smishing
  10. Decryption
  11. Security
  12. Password
  13. Security information and event management (SIEM)
  14. Responsibility
  15. Login
  16. Information
  17. Legal
  18. OneDrive
  19. Multi-Factor Authentication
  20. Outlook
  21. Click
  22. PHI
  23. Website
  24. Exchange
  25. Risk
  26. KnowBe4
  27. Suspicious
  28. Certificate
  29. Phishing
  30. Threat
  31. Cyber
  32. Email
  33. Intrusion prevention system (IPS)
  34. Firewall
  35. Server
  36. Intrusion detection system (IDS)
  37. Verify
  38. DMZ
  39. PII
  40. Encryption
  41. Instagram
  42. Router
  43. Cisco
  44. Personal
  45. Virtual private network (VPN)
  46. Username
  47. Work
  48. Internet
  49. Data Breach
  50. Mobile
  51. SharePoint
  52. Malicious
  53. Intranet
  54. Twitter
  55. Authentication
  56. 2FA (Two factor authentication)
  57. Protected
  58. Internet service provider (ISP)
  59. Identify
  60. Vishing
  61. Vulnerability
  62. Vishing