Weak Passwords Public Charging Stations No Backup Solutions Ignored Warnings Default Configs Unpatched Software Unchecked Downloads Social Engineering Over- Sharing Unknown Devices Out of Date Systems Reuse of Passwords Clicked on a Phish No Cyber Hygiene No 2FA Enabled Shared Passwords among Teams Avoided Updates Unencrypted Devices Unauthorized Access Insecure APIs Open Wi-Fi Networks Email Phishing Unattended Computers Lack of Cyber Education Weak Passwords Public Charging Stations No Backup Solutions Ignored Warnings Default Configs Unpatched Software Unchecked Downloads Social Engineering Over- Sharing Unknown Devices Out of Date Systems Reuse of Passwords Clicked on a Phish No Cyber Hygiene No 2FA Enabled Shared Passwords among Teams Avoided Updates Unencrypted Devices Unauthorized Access Insecure APIs Open Wi-Fi Networks Email Phishing Unattended Computers Lack of Cyber Education
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Weak Passwords
Public Charging Stations
No Backup Solutions
Ignored Warnings
Default Configs
Unpatched Software
Unchecked Downloads
Social Engineering
Over-Sharing
Unknown Devices
Out of Date Systems
Reuse of Passwords
Clicked on a Phish
No Cyber Hygiene
No 2FA Enabled
Shared Passwords among Teams
Avoided Updates
Unencrypted Devices
Unauthorized Access
Insecure APIs
Open Wi-Fi Networks
Email Phishing
Unattended Computers
Lack of Cyber Education