CYBERSECURITY AWARENESS MONTH ANNUAL SECURITY TRAINING SHARING SENSITIVE DATA Hacker BUSINESS EMAIL COMPROMISE (BEC) PASSWORD SPRAYING Spoofing PASSPHRASE CHATGPT Information Security CYBERSECURITY HYGIENE IDENTITY THEFT RANSOMWARE SOCIAL ENGINEERING Cloud Security Data Breach KNOWBE4 MALWARE PHISHING Trojan Horse MULTI-FACTOR AUTHENTICATION (MFA) Internet of Things SECURITY AWARENESS PASSWORD STRENGTH METER VPN (Virtual Private Network) ARTIFICIAL INTELLIGENCE Encryption VISHING SMISHING CYBERSECURITY AWARENESS MONTH ANNUAL SECURITY TRAINING SHARING SENSITIVE DATA Hacker BUSINESS EMAIL COMPROMISE (BEC) PASSWORD SPRAYING Spoofing PASSPHRASE CHATGPT Information Security CYBERSECURITY HYGIENE IDENTITY THEFT RANSOMWARE SOCIAL ENGINEERING Cloud Security Data Breach KNOWBE4 MALWARE PHISHING Trojan Horse MULTI-FACTOR AUTHENTICATION (MFA) Internet of Things SECURITY AWARENESS PASSWORD STRENGTH METER VPN (Virtual Private Network) ARTIFICIAL INTELLIGENCE Encryption VISHING SMISHING
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
CYBERSECURITY AWARENESS MONTH
ANNUAL SECURITY TRAINING
SHARING SENSITIVE DATA
Hacker
BUSINESS EMAIL COMPROMISE (BEC)
PASSWORD SPRAYING
Spoofing
PASSPHRASE
CHATGPT
Information Security
CYBERSECURITY HYGIENE
IDENTITY THEFT
RANSOMWARE
SOCIAL ENGINEERING
Cloud Security
Data Breach
KNOWBE4
MALWARE
PHISHING
Trojan Horse
MULTI-FACTOR AUTHENTICATION (MFA)
Internet of Things
SECURITY AWARENESS
PASSWORD STRENGTH METER
VPN (Virtual Private Network)
ARTIFICIAL INTELLIGENCE
Encryption
VISHING
SMISHING