USB Honeypots Malware Virus Baiting Human weaknesses ISO 27001 Dark web Cyberattack Vulnerability Phishing Personally identifiable information (PII) Threat Awareness Social Engineering Password Reuse Availability Software/OS updates Clear Desk Awareness Zero- day Data Breach Exploit Secure Phones Encryption
Scam / Hoax Integrity Incident Reporting ISMS Training Multi-factor authentication (MFA) Compromise Ransomware Screen lock policy Password Policy USB Honeypots Malware Virus Baiting Human weaknesses ISO 27001 Dark web Cyberattack Vulnerability Phishing Personally identifiable information (PII) Threat Awareness Social Engineering Password Reuse Availability Software/OS updates Clear Desk Awareness Zero- day Data Breach Exploit Secure Phones Encryption Scam / Hoax Integrity Incident Reporting ISMS Training Multi-factor authentication (MFA) Compromise Ransomware Screen lock policy Password Policy
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
USB Honeypots
Malware
Virus
Baiting
Human weaknesses
ISO 27001
Dark web
Cyberattack
Vulnerability
Phishing
Personally identifiable information (PII)
Threat Awareness
Social Engineering
Password Reuse
Availability
Software/OS updates
Clear Desk
Awareness
Zero-day
Data Breach
Exploit
Secure Phones
Encryption
Scam / Hoax
Integrity
Incident Reporting
ISMS Training
Multi-factor authentication (MFA)
Compromise
Ransomware
Screen lock policy
Password Policy