SecurityLiaisonMalwareWhalephishingDarkwebBreachWormBackupsAwarenessTrainingEncryptionCyberattackMulti-factorauthentication(MFA)IntrusionPersonallyidentifiableinformation(PII)ScreenlockpolicySpearphishingVirusExploitZero-dayPasswordManagerSoftwareupdatesExtorsionScareWareVulnerabilityPhishingScarewareSecurityLiaisonMalwareWhalephishingDarkwebBreachWormBackupsAwarenessTrainingEncryptionCyberattackMulti-factorauthentication(MFA)IntrusionPersonallyidentifiableinformation(PII)ScreenlockpolicySpearphishingVirusExploitZero-dayPasswordManagerSoftwareupdatesExtorsionScareWareVulnerabilityPhishingScareware

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Security Liaison
  2. Malware
  3. Whale phishing
  4. Dark web
  5. Breach
  6. Worm
  7. Backups
  8. Awareness Training
  9. Encryption
  10. Cyberattack
  11. Multi-factor authentication (MFA)
  12. Intrusion
  13. Personally identifiable information (PII)
  14. Screen lock policy
  15. Spear phishing
  16. Virus
  17. Exploit
  18. Zero-day
  19. Password Manager
  20. Software updates
  21. Extorsion
  22. ScareWare
  23. Vulnerability
  24. Phishing
  25. Scareware