BUSINESS EMAIL COMPROMISE (BEC) Information Security CYBERSECURITY HYGIENE MALWARE VISHING MULTI-FACTOR AUTHENTICATION (MFA) ARTIFICIAL INTELLIGENCE SECURITY AWARENESS Cloud Security Encryption RANSOMWARE KNOWBE4 IDENTITY THEFT ANNUAL SECURITY TRAINING SOCIAL ENGINEERING VPN (Virtual Private Network) PASSPHRASE Hacker CHATGPT SMISHING Data Breach PASSWORD SPRAYING PHISHING PASSWORD STRENGTH METER Internet of Things SHARING SENSITIVE DATA Spoofing Trojan Horse CYBERSECURITY AWARENESS MONTH BUSINESS EMAIL COMPROMISE (BEC) Information Security CYBERSECURITY HYGIENE MALWARE VISHING MULTI-FACTOR AUTHENTICATION (MFA) ARTIFICIAL INTELLIGENCE SECURITY AWARENESS Cloud Security Encryption RANSOMWARE KNOWBE4 IDENTITY THEFT ANNUAL SECURITY TRAINING SOCIAL ENGINEERING VPN (Virtual Private Network) PASSPHRASE Hacker CHATGPT SMISHING Data Breach PASSWORD SPRAYING PHISHING PASSWORD STRENGTH METER Internet of Things SHARING SENSITIVE DATA Spoofing Trojan Horse CYBERSECURITY AWARENESS MONTH
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
BUSINESS EMAIL COMPROMISE (BEC)
Information Security
CYBERSECURITY HYGIENE
MALWARE
VISHING
MULTI-FACTOR AUTHENTICATION (MFA)
ARTIFICIAL INTELLIGENCE
SECURITY AWARENESS
Cloud Security
Encryption
RANSOMWARE
KNOWBE4
IDENTITY THEFT
ANNUAL SECURITY TRAINING
SOCIAL ENGINEERING
VPN (Virtual Private Network)
PASSPHRASE
Hacker
CHATGPT
SMISHING
Data Breach
PASSWORD SPRAYING
PHISHING
PASSWORD STRENGTH METER
Internet of Things
SHARING SENSITIVE DATA
Spoofing
Trojan Horse
CYBERSECURITY AWARENESS MONTH