Internetserviceprovider(ISP)WorkVishingPHIMaliciousWebsiteIntrusiondetectionsystem(IDS)SecurityLoginCyberFacebookIdentifyExchangeMulti-FactorAuthenticationInstagramUsernameDMZMobileOutlookCiscoPersonalFirewallWi-FiPasswordPhishingDisableCertificateClick2FA (Twofactorauthentication)ServerDataBreachThreatVirtualprivatenetwork(VPN)SmishingEthernetTLS1.2AuthenticationIntranetDecryptionIntrusionpreventionsystem(IPS)SuspiciousEncryptionRouterResponsibilitySmishingKnowBe4LegalEmailPIIVishingInformationDeviceSharePointSecurityinformationand eventmanagement(SIEM)VerifyInternetMalwareProtectedTwitterRiskVulnerabilityOneDriveInternetserviceprovider(ISP)WorkVishingPHIMaliciousWebsiteIntrusiondetectionsystem(IDS)SecurityLoginCyberFacebookIdentifyExchangeMulti-FactorAuthenticationInstagramUsernameDMZMobileOutlookCiscoPersonalFirewallWi-FiPasswordPhishingDisableCertificateClick2FA (Twofactorauthentication)ServerDataBreachThreatVirtualprivatenetwork(VPN)SmishingEthernetTLS1.2AuthenticationIntranetDecryptionIntrusionpreventionsystem(IPS)SuspiciousEncryptionRouterResponsibilitySmishingKnowBe4LegalEmailPIIVishingInformationDeviceSharePointSecurityinformationand eventmanagement(SIEM)VerifyInternetMalwareProtectedTwitterRiskVulnerabilityOneDrive

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
  1. Internet service provider (ISP)
  2. Work
  3. Vishing
  4. PHI
  5. Malicious
  6. Website
  7. Intrusion detection system (IDS)
  8. Security
  9. Login
  10. Cyber
  11. Facebook
  12. Identify
  13. Exchange
  14. Multi-Factor Authentication
  15. Instagram
  16. Username
  17. DMZ
  18. Mobile
  19. Outlook
  20. Cisco
  21. Personal
  22. Firewall
  23. Wi-Fi
  24. Password
  25. Phishing
  26. Disable
  27. Certificate
  28. Click
  29. 2FA (Two factor authentication)
  30. Server
  31. Data Breach
  32. Threat
  33. Virtual private network (VPN)
  34. Smishing
  35. Ethernet
  36. TLS 1.2
  37. Authentication
  38. Intranet
  39. Decryption
  40. Intrusion prevention system (IPS)
  41. Suspicious
  42. Encryption
  43. Router
  44. Responsibility
  45. Smishing
  46. KnowBe4
  47. Legal
  48. Email
  49. PII
  50. Vishing
  51. Information
  52. Device
  53. SharePoint
  54. Security information and event management (SIEM)
  55. Verify
  56. Internet
  57. Malware
  58. Protected
  59. Twitter
  60. Risk
  61. Vulnerability
  62. OneDrive