SMISHINGMULTI-FACTORAUTHENTICATION(MFA)BUSINESSEMAILCOMPROMISE(BEC)CYBERSECURITYHYGIENECHATGPTVISHINGSpoofingSECURITYAWARENESSMALWAREPASSPHRASEInternetofThingsCloudSecurityTrojanHorsePASSWORDSPRAYINGInformationSecurityVPN(VirtualPrivateNetwork)IDENTITYTHEFTCYBERSECURITYAWARENESSMONTHHackerKNOWBE4SOCIALENGINEERINGRANSOMWAREPHISHINGDataBreachEncryptionARTIFICIALINTELLIGENCESHARINGSENSITIVEDATAPASSWORDSTRENGTHMETERANNUALSECURITYTRAININGSMISHINGMULTI-FACTORAUTHENTICATION(MFA)BUSINESSEMAILCOMPROMISE(BEC)CYBERSECURITYHYGIENECHATGPTVISHINGSpoofingSECURITYAWARENESSMALWAREPASSPHRASEInternetofThingsCloudSecurityTrojanHorsePASSWORDSPRAYINGInformationSecurityVPN(VirtualPrivateNetwork)IDENTITYTHEFTCYBERSECURITYAWARENESSMONTHHackerKNOWBE4SOCIALENGINEERINGRANSOMWAREPHISHINGDataBreachEncryptionARTIFICIALINTELLIGENCESHARINGSENSITIVEDATAPASSWORDSTRENGTHMETERANNUALSECURITYTRAINING

Cybersecurity Superhero BINGO! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. SMISHING
  2. MULTI-FACTOR AUTHENTICATION (MFA)
  3. BUSINESS EMAIL COMPROMISE (BEC)
  4. CYBERSECURITY HYGIENE
  5. CHATGPT
  6. VISHING
  7. Spoofing
  8. SECURITY AWARENESS
  9. MALWARE
  10. PASSPHRASE
  11. Internet of Things
  12. Cloud Security
  13. Trojan Horse
  14. PASSWORD SPRAYING
  15. Information Security
  16. VPN (Virtual Private Network)
  17. IDENTITY THEFT
  18. CYBERSECURITY AWARENESS MONTH
  19. Hacker
  20. KNOWBE4
  21. SOCIAL ENGINEERING
  22. RANSOMWARE
  23. PHISHING
  24. Data Breach
  25. Encryption
  26. ARTIFICIAL INTELLIGENCE
  27. SHARING SENSITIVE DATA
  28. PASSWORD STRENGTH METER
  29. ANNUAL SECURITY TRAINING