ExploitPersonallyidentifiableinformation(PII)AwarenessVulnerabilityPhishingMulti-factorauthentication(MFA)CompromiseBreachIntrusion12CharacterpasswordsCyberattackScarewareScreenlockpolicyVirusBackupsClickJackMalwareZero-daySoftwareupdatesDarkwebSpearphishingWormWhalephishingTrainingRansomwareExploitPersonallyidentifiableinformation(PII)AwarenessVulnerabilityPhishingMulti-factorauthentication(MFA)CompromiseBreachIntrusion12CharacterpasswordsCyberattackScarewareScreenlockpolicyVirusBackupsClickJackMalwareZero-daySoftwareupdatesDarkwebSpearphishingWormWhalephishingTrainingRansomware

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Exploit
  2. Personally identifiable information (PII)
  3. Awareness
  4. Vulnerability
  5. Phishing
  6. Multi-factor authentication (MFA)
  7. Compromise
  8. Breach
  9. Intrusion
  10. 12 Character passwords
  11. Cyberattack
  12. Scareware
  13. Screen lock policy
  14. Virus
  15. Backups
  16. ClickJack
  17. Malware
  18. Zero-day
  19. Software updates
  20. Dark web
  21. Spear phishing
  22. Worm
  23. Whale phishing
  24. Training
  25. Ransomware