Smishing Facebook Malware Disable Device TLS 1.2 Wi- Fi Ethernet Smishing Decryption Security Password Security information and event management (SIEM) Responsibility Login Information Legal OneDrive Multi-Factor Authentication Outlook Click PHI Website Exchange Risk KnowBe4 Suspicious Certificate Phishing Threat Cyber Email Intrusion prevention system (IPS) Firewall Server Intrusion detection system (IDS) Verify DMZ PII Encryption Instagram Router Cisco Personal Virtual private network (VPN) Username Work Internet Data Breach Mobile SharePoint Malicious Intranet Twitter Authentication 2FA (Two factor authentication) Protected Internet service provider (ISP) Identify Vishing Vulnerability Vishing Smishing Facebook Malware Disable Device TLS 1.2 Wi- Fi Ethernet Smishing Decryption Security Password Security information and event management (SIEM) Responsibility Login Information Legal OneDrive Multi-Factor Authentication Outlook Click PHI Website Exchange Risk KnowBe4 Suspicious Certificate Phishing Threat Cyber Email Intrusion prevention system (IPS) Firewall Server Intrusion detection system (IDS) Verify DMZ PII Encryption Instagram Router Cisco Personal Virtual private network (VPN) Username Work Internet Data Breach Mobile SharePoint Malicious Intranet Twitter Authentication 2FA (Two factor authentication) Protected Internet service provider (ISP) Identify Vishing Vulnerability Vishing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Smishing
Facebook
Malware
Disable
Device
TLS 1.2
Wi-Fi
Ethernet
Smishing
Decryption
Security
Password
Security information and event management (SIEM)
Responsibility
Login
Information
Legal
OneDrive
Multi-Factor Authentication
Outlook
Click
PHI
Website
Exchange
Risk
KnowBe4
Suspicious
Certificate
Phishing
Threat
Cyber
Email
Intrusion prevention system (IPS)
Firewall
Server
Intrusion detection system (IDS)
Verify
DMZ
PII
Encryption
Instagram
Router
Cisco
Personal
Virtual private network (VPN)
Username
Work
Internet
Data Breach
Mobile
SharePoint
Malicious
Intranet
Twitter
Authentication
2FA (Two factor authentication)
Protected
Internet service provider (ISP)
Identify
Vishing
Vulnerability
Vishing