IDENTITY THEFT PASSPHRASE Internet of Things Hacker ANNUAL SECURITY TRAINING BUSINESS EMAIL COMPROMISE (BEC) Cloud Security SHARING SENSITIVE DATA ARTIFICIAL INTELLIGENCE SMISHING PHISHING VISHING PASSWORD STRENGTH METER CYBERSECURITY HYGIENE MALWARE Encryption SECURITY AWARENESS Information Security KNOWBE4 Trojan Horse RANSOMWARE SOCIAL ENGINEERING CHATGPT VPN (Virtual Private Network) Spoofing PASSWORD SPRAYING CYBERSECURITY AWARENESS MONTH Data Breach MULTI-FACTOR AUTHENTICATION (MFA) IDENTITY THEFT PASSPHRASE Internet of Things Hacker ANNUAL SECURITY TRAINING BUSINESS EMAIL COMPROMISE (BEC) Cloud Security SHARING SENSITIVE DATA ARTIFICIAL INTELLIGENCE SMISHING PHISHING VISHING PASSWORD STRENGTH METER CYBERSECURITY HYGIENE MALWARE Encryption SECURITY AWARENESS Information Security KNOWBE4 Trojan Horse RANSOMWARE SOCIAL ENGINEERING CHATGPT VPN (Virtual Private Network) Spoofing PASSWORD SPRAYING CYBERSECURITY AWARENESS MONTH Data Breach MULTI-FACTOR AUTHENTICATION (MFA)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
IDENTITY THEFT
PASSPHRASE
Internet of Things
Hacker
ANNUAL SECURITY TRAINING
BUSINESS EMAIL COMPROMISE (BEC)
Cloud Security
SHARING SENSITIVE DATA
ARTIFICIAL INTELLIGENCE
SMISHING
PHISHING
VISHING
PASSWORD STRENGTH METER
CYBERSECURITY HYGIENE
MALWARE
Encryption
SECURITY AWARENESS
Information Security
KNOWBE4
Trojan Horse
RANSOMWARE
SOCIAL ENGINEERING
CHATGPT
VPN (Virtual Private Network)
Spoofing
PASSWORD SPRAYING
CYBERSECURITY AWARENESS MONTH
Data Breach
MULTI-FACTOR AUTHENTICATION (MFA)