Ransomware Incident Reporting Human weaknesses Secure Phones Password Policy Dark web Exploit Availability Threat Awareness Encryption Software/OS updates Baiting Phishing Clear Desk Personally identifiable information (PII) Malware Password Reuse Vulnerability Data Breach ISO 27001 Cyberattack Awareness Virus Screen lock policy Zero- day Compromise
Scam / Hoax Integrity USB Honeypots ISMS Training Multi-factor authentication (MFA) Social Engineering Ransomware Incident Reporting Human weaknesses Secure Phones Password Policy Dark web Exploit Availability Threat Awareness Encryption Software/OS updates Baiting Phishing Clear Desk Personally identifiable information (PII) Malware Password Reuse Vulnerability Data Breach ISO 27001 Cyberattack Awareness Virus Screen lock policy Zero- day Compromise Scam / Hoax Integrity USB Honeypots ISMS Training Multi-factor authentication (MFA) Social Engineering
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Ransomware
Incident Reporting
Human weaknesses
Secure Phones
Password Policy
Dark web
Exploit
Availability
Threat Awareness
Encryption
Software/OS updates
Baiting
Phishing
Clear Desk
Personally identifiable information (PII)
Malware
Password Reuse
Vulnerability
Data Breach
ISO 27001
Cyberattack
Awareness
Virus
Screen lock policy
Zero-day
Compromise
Scam / Hoax
Integrity
USB Honeypots
ISMS Training
Multi-factor authentication (MFA)
Social Engineering