Scam / Hoax Cyberattack Password Reuse Dark web Virus Software/OS updates Social Engineering Malware Secure Phones Password Policy Personally identifiable information (PII) Vulnerability Clear Desk Exploit Multi-factor authentication (MFA) Integrity Awareness Baiting Screen lock policy Incident Reporting ISO 27001 Availability Ransomware Zero- day Human weaknesses Threat Awareness Phishing Data Breach Compromise ISMS Training USB Honeypots Encryption Scam / Hoax Cyberattack Password Reuse Dark web Virus Software/OS updates Social Engineering Malware Secure Phones Password Policy Personally identifiable information (PII) Vulnerability Clear Desk Exploit Multi-factor authentication (MFA) Integrity Awareness Baiting Screen lock policy Incident Reporting ISO 27001 Availability Ransomware Zero- day Human weaknesses Threat Awareness Phishing Data Breach Compromise ISMS Training USB Honeypots Encryption
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Scam / Hoax
Cyberattack
Password Reuse
Dark web
Virus
Software/OS updates
Social Engineering
Malware
Secure Phones
Password Policy
Personally identifiable information (PII)
Vulnerability
Clear Desk
Exploit
Multi-factor authentication (MFA)
Integrity
Awareness
Baiting
Screen lock policy
Incident Reporting
ISO 27001
Availability
Ransomware
Zero-day
Human weaknesses
Threat Awareness
Phishing
Data Breach
Compromise
ISMS Training
USB Honeypots
Encryption