VulnerabilitySoftwareupdatesDarkwebPasswordManagerPersonallyidentifiableinformation(PII)CyberattackWhalephishingBackupsZero-dayExtorsionExploitAwarenessTrainingTrainingEncryptionScarewareWormScreenlockpolicyCompromiseIntrusionBreachVirusMulti-factorauthentication(MFA)MalwareSpearphishingPhishingVulnerabilitySoftwareupdatesDarkwebPasswordManagerPersonallyidentifiableinformation(PII)CyberattackWhalephishingBackupsZero-dayExtorsionExploitAwarenessTrainingTrainingEncryptionScarewareWormScreenlockpolicyCompromiseIntrusionBreachVirusMulti-factorauthentication(MFA)MalwareSpearphishingPhishing

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Vulnerability
  2. Software updates
  3. Dark web
  4. Password Manager
  5. Personally identifiable information (PII)
  6. Cyberattack
  7. Whale phishing
  8. Backups
  9. Zero-day
  10. Extorsion
  11. Exploit
  12. Awareness Training
  13. Training
  14. Encryption
  15. Scareware
  16. Worm
  17. Screen lock policy
  18. Compromise
  19. Intrusion
  20. Breach
  21. Virus
  22. Multi-factor authentication (MFA)
  23. Malware
  24. Spear phishing
  25. Phishing