Phishing Availability Baiting Password Policy Threat Awareness Dark web Encryption Secure Phones Incident Reporting Multi-factor authentication (MFA) Screen lock policy Virus Zero- day USB Honeypots Ransomware Personally identifiable information (PII) Awareness Clear Desk ISO 27001 Malware Cyberattack Compromise
Scam / Hoax Software/OS updates Integrity ISMS Training Exploit Vulnerability Human weaknesses Password Reuse Social Engineering Data Breach Phishing Availability Baiting Password Policy Threat Awareness Dark web Encryption Secure Phones Incident Reporting Multi-factor authentication (MFA) Screen lock policy Virus Zero- day USB Honeypots Ransomware Personally identifiable information (PII) Awareness Clear Desk ISO 27001 Malware Cyberattack Compromise Scam / Hoax Software/OS updates Integrity ISMS Training Exploit Vulnerability Human weaknesses Password Reuse Social Engineering Data Breach
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Phishing
Availability
Baiting
Password Policy
Threat Awareness
Dark web
Encryption
Secure Phones
Incident Reporting
Multi-factor authentication (MFA)
Screen lock policy
Virus
Zero-day
USB Honeypots
Ransomware
Personally identifiable information (PII)
Awareness
Clear Desk
ISO 27001
Malware
Cyberattack
Compromise
Scam / Hoax
Software/OS updates
Integrity
ISMS Training
Exploit
Vulnerability
Human weaknesses
Password Reuse
Social Engineering
Data Breach