PhishingZero-dayCompromiseWormExploitMulti-factorauthentication(MFA)BreachCyberattackTrainingBackupsSpearphishingIntrusion12CharacterpasswordsAwarenessWhalephishingRansomwareScreenlockpolicyVirusVulnerabilityDarkwebClickJackScarewareSoftwareupdatesMalwarePersonallyidentifiableinformation(PII)PhishingZero-dayCompromiseWormExploitMulti-factorauthentication(MFA)BreachCyberattackTrainingBackupsSpearphishingIntrusion12CharacterpasswordsAwarenessWhalephishingRansomwareScreenlockpolicyVirusVulnerabilityDarkwebClickJackScarewareSoftwareupdatesMalwarePersonallyidentifiableinformation(PII)

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Phishing
  2. Zero-day
  3. Compromise
  4. Worm
  5. Exploit
  6. Multi-factor authentication (MFA)
  7. Breach
  8. Cyberattack
  9. Training
  10. Backups
  11. Spear phishing
  12. Intrusion
  13. 12 Character passwords
  14. Awareness
  15. Whale phishing
  16. Ransomware
  17. Screen lock policy
  18. Virus
  19. Vulnerability
  20. Dark web
  21. ClickJack
  22. Scareware
  23. Software updates
  24. Malware
  25. Personally identifiable information (PII)