WhalephishingIntrusionSoftwareupdatesMulti-factorauthentication(MFA)Zero-dayScreenlockpolicyWormAwarenessTrainingScarewareExploitVirusBackupsCyberattackMalwareExtorsionPersonallyidentifiableinformation(PII)EncryptionBreachTrainingVulnerabilityPhishingDarkwebCompromisePasswordManagerSpearphishingWhalephishingIntrusionSoftwareupdatesMulti-factorauthentication(MFA)Zero-dayScreenlockpolicyWormAwarenessTrainingScarewareExploitVirusBackupsCyberattackMalwareExtorsionPersonallyidentifiableinformation(PII)EncryptionBreachTrainingVulnerabilityPhishingDarkwebCompromisePasswordManagerSpearphishing

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Whale phishing
  2. Intrusion
  3. Software updates
  4. Multi-factor authentication (MFA)
  5. Zero-day
  6. Screen lock policy
  7. Worm
  8. Awareness Training
  9. Scareware
  10. Exploit
  11. Virus
  12. Backups
  13. Cyberattack
  14. Malware
  15. Extorsion
  16. Personally identifiable information (PII)
  17. Encryption
  18. Breach
  19. Training
  20. Vulnerability
  21. Phishing
  22. Dark web
  23. Compromise
  24. Password Manager
  25. Spear phishing