ScareWareWormBackupsScreenlockpolicySpearphishingBreachEncryptionDarkwebPasswordManagerAwarenessTrainingPersonallyidentifiableinformation(PII)VirusExtorsionCyberattackScarewareZero-daySoftwareupdatesMalwareVulnerabilityExploitPhishingIntrusionSecurityLiaisonWhalephishingMulti-factorauthentication(MFA)ScareWareWormBackupsScreenlockpolicySpearphishingBreachEncryptionDarkwebPasswordManagerAwarenessTrainingPersonallyidentifiableinformation(PII)VirusExtorsionCyberattackScarewareZero-daySoftwareupdatesMalwareVulnerabilityExploitPhishingIntrusionSecurityLiaisonWhalephishingMulti-factorauthentication(MFA)

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. ScareWare
  2. Worm
  3. Backups
  4. Screen lock policy
  5. Spear phishing
  6. Breach
  7. Encryption
  8. Dark web
  9. Password Manager
  10. Awareness Training
  11. Personally identifiable information (PII)
  12. Virus
  13. Extorsion
  14. Cyberattack
  15. Scareware
  16. Zero-day
  17. Software updates
  18. Malware
  19. Vulnerability
  20. Exploit
  21. Phishing
  22. Intrusion
  23. Security Liaison
  24. Whale phishing
  25. Multi-factor authentication (MFA)