ReusingpasswordsRansomwareBackupsEncryptionExploitZero-dayVulnerabilityVirusDarkwebCompromiseWhalephishingMulti-factorauthentication(MFA)TrainingCyberattackScreenlockpolicyBreachPersonallyidentifiableinformation(PII)MalwareWormSpearphishingScarewareIntrusionPhishingAwarenessSoftwareupdatesReusingpasswordsRansomwareBackupsEncryptionExploitZero-dayVulnerabilityVirusDarkwebCompromiseWhalephishingMulti-factorauthentication(MFA)TrainingCyberattackScreenlockpolicyBreachPersonallyidentifiableinformation(PII)MalwareWormSpearphishingScarewareIntrusionPhishingAwarenessSoftwareupdates

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Reusing passwords
  2. Ransomware
  3. Backups
  4. Encryption
  5. Exploit
  6. Zero-day
  7. Vulnerability
  8. Virus
  9. Dark web
  10. Compromise
  11. Whale phishing
  12. Multi-factor authentication (MFA)
  13. Training
  14. Cyberattack
  15. Screen lock policy
  16. Breach
  17. Personally identifiable information (PII)
  18. Malware
  19. Worm
  20. Spear phishing
  21. Scareware
  22. Intrusion
  23. Phishing
  24. Awareness
  25. Software updates