Clicked on a Phish Over- Sharing Avoided Updates Unknown Devices Default Configs Unchecked Downloads No 2FA Enabled Out of Date Systems Unauthorized Access No Backup Solutions Social Engineering Shared Passwords among Teams Weak Passwords Insecure APIs Lack of Cyber Education Unpatched Software Reuse of Passwords Unencrypted Devices Ignored Warnings Unattended Computers No Cyber Hygiene Open Wi-Fi Networks Public Charging Stations Email Phishing Clicked on a Phish Over- Sharing Avoided Updates Unknown Devices Default Configs Unchecked Downloads No 2FA Enabled Out of Date Systems Unauthorized Access No Backup Solutions Social Engineering Shared Passwords among Teams Weak Passwords Insecure APIs Lack of Cyber Education Unpatched Software Reuse of Passwords Unencrypted Devices Ignored Warnings Unattended Computers No Cyber Hygiene Open Wi-Fi Networks Public Charging Stations Email Phishing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Clicked on a Phish
Over-Sharing
Avoided Updates
Unknown Devices
Default Configs
Unchecked Downloads
No 2FA Enabled
Out of Date Systems
Unauthorized Access
No Backup Solutions
Social Engineering
Shared Passwords among Teams
Weak Passwords
Insecure APIs
Lack of Cyber Education
Unpatched Software
Reuse of Passwords
Unencrypted Devices
Ignored Warnings
Unattended Computers
No Cyber Hygiene
Open Wi-Fi Networks
Public Charging Stations
Email Phishing