Facebook Malicious Outlook PII Intrusion prevention system (IPS) Encryption Exchange Certificate Ethernet Work Identify SharePoint Authentication Internet service provider (ISP) PHI Login Intrusion detection system (IDS) Email Multi-Factor Authentication Internet Smishing KnowBe4 Threat Phishing Protected OneDrive Data Breach Decryption Cisco Security information and event management (SIEM) Malware Mobile Risk Router Verify Legal Personal Vishing Username Smishing Firewall Website 2FA (Two factor authentication) Virtual private network (VPN) Responsibility Cyber DMZ TLS 1.2 Information Device Twitter Click Instagram Vulnerability Wi- Fi Password Security Vishing Intranet Disable Server Suspicious Facebook Malicious Outlook PII Intrusion prevention system (IPS) Encryption Exchange Certificate Ethernet Work Identify SharePoint Authentication Internet service provider (ISP) PHI Login Intrusion detection system (IDS) Email Multi-Factor Authentication Internet Smishing KnowBe4 Threat Phishing Protected OneDrive Data Breach Decryption Cisco Security information and event management (SIEM) Malware Mobile Risk Router Verify Legal Personal Vishing Username Smishing Firewall Website 2FA (Two factor authentication) Virtual private network (VPN) Responsibility Cyber DMZ TLS 1.2 Information Device Twitter Click Instagram Vulnerability Wi- Fi Password Security Vishing Intranet Disable Server Suspicious
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Facebook
Malicious
Outlook
PII
Intrusion prevention system (IPS)
Encryption
Exchange
Certificate
Ethernet
Work
Identify
SharePoint
Authentication
Internet service provider (ISP)
PHI
Login
Intrusion detection system (IDS)
Email
Multi-Factor Authentication
Internet
Smishing
KnowBe4
Threat
Phishing
Protected
OneDrive
Data Breach
Decryption
Cisco
Security information and event management (SIEM)
Malware
Mobile
Risk
Router
Verify
Legal
Personal
Vishing
Username
Smishing
Firewall
Website
2FA (Two factor authentication)
Virtual private network (VPN)
Responsibility
Cyber
DMZ
TLS 1.2
Information
Device
Twitter
Click
Instagram
Vulnerability
Wi-Fi
Password
Security
Vishing
Intranet
Disable
Server
Suspicious