Data Breach ISO 27001 Virus
Scam / Hoax Availability Clear Desk Social Engineering Baiting ISMS Training Secure Phones Phishing Incident Reporting Password Reuse Human weaknesses Password Policy Encryption Personally identifiable information (PII) Malware Integrity Screen lock policy Zero- day Compromise Ransomware Dark web Exploit Threat Awareness USB Honeypots Cyberattack Awareness Vulnerability Multi-factor authentication (MFA) Software/OS updates Data Breach ISO 27001 Virus Scam / Hoax Availability Clear Desk Social Engineering Baiting ISMS Training Secure Phones Phishing Incident Reporting Password Reuse Human weaknesses Password Policy Encryption Personally identifiable information (PII) Malware Integrity Screen lock policy Zero- day Compromise Ransomware Dark web Exploit Threat Awareness USB Honeypots Cyberattack Awareness Vulnerability Multi-factor authentication (MFA) Software/OS updates
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Breach
ISO 27001
Virus
Scam / Hoax
Availability
Clear Desk
Social Engineering
Baiting
ISMS Training
Secure Phones
Phishing
Incident Reporting
Password Reuse
Human weaknesses
Password Policy
Encryption
Personally identifiable information (PII)
Malware
Integrity
Screen lock policy
Zero-day
Compromise
Ransomware
Dark web
Exploit
Threat Awareness
USB Honeypots
Cyberattack
Awareness
Vulnerability
Multi-factor authentication (MFA)
Software/OS updates