Screen lock policy Secure Phones Ransomware Encryption Virus Availability Zero- day ISMS Training Personally identifiable information (PII) Password Reuse Phishing Threat Awareness Malware Cyberattack Compromise Baiting Exploit Password Policy Integrity Awareness Dark web Multi-factor authentication (MFA) USB Honeypots Human weaknesses Software/OS updates Clear Desk Social Engineering ISO 27001
Scam / Hoax Incident Reporting Data Breach Vulnerability Screen lock policy Secure Phones Ransomware Encryption Virus Availability Zero- day ISMS Training Personally identifiable information (PII) Password Reuse Phishing Threat Awareness Malware Cyberattack Compromise Baiting Exploit Password Policy Integrity Awareness Dark web Multi-factor authentication (MFA) USB Honeypots Human weaknesses Software/OS updates Clear Desk Social Engineering ISO 27001 Scam / Hoax Incident Reporting Data Breach Vulnerability
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Screen lock policy
Secure Phones
Ransomware
Encryption
Virus
Availability
Zero-day
ISMS Training
Personally identifiable information (PII)
Password Reuse
Phishing
Threat Awareness
Malware
Cyberattack
Compromise
Baiting
Exploit
Password Policy
Integrity
Awareness
Dark web
Multi-factor authentication (MFA)
USB Honeypots
Human weaknesses
Software/OS updates
Clear Desk
Social Engineering
ISO 27001
Scam / Hoax
Incident Reporting
Data Breach
Vulnerability