SOCIAL ENGINEERING SMISHING ANNUAL SECURITY TRAINING Spoofing CHATGPT Cloud Security CYBERSECURITY HYGIENE RANSOMWARE Internet of Things VISHING Encryption Hacker Trojan Horse SECURITY AWARENESS Information Security PASSWORD SPRAYING CYBERSECURITY AWARENESS MONTH SHARING SENSITIVE DATA MULTI-FACTOR AUTHENTICATION (MFA) PASSWORD STRENGTH METER BUSINESS EMAIL COMPROMISE (BEC) KNOWBE4 PASSPHRASE PHISHING MALWARE VPN (Virtual Private Network) IDENTITY THEFT ARTIFICIAL INTELLIGENCE Data Breach SOCIAL ENGINEERING SMISHING ANNUAL SECURITY TRAINING Spoofing CHATGPT Cloud Security CYBERSECURITY HYGIENE RANSOMWARE Internet of Things VISHING Encryption Hacker Trojan Horse SECURITY AWARENESS Information Security PASSWORD SPRAYING CYBERSECURITY AWARENESS MONTH SHARING SENSITIVE DATA MULTI-FACTOR AUTHENTICATION (MFA) PASSWORD STRENGTH METER BUSINESS EMAIL COMPROMISE (BEC) KNOWBE4 PASSPHRASE PHISHING MALWARE VPN (Virtual Private Network) IDENTITY THEFT ARTIFICIAL INTELLIGENCE Data Breach
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
SOCIAL ENGINEERING
SMISHING
ANNUAL SECURITY TRAINING
Spoofing
CHATGPT
Cloud Security
CYBERSECURITY HYGIENE
RANSOMWARE
Internet of Things
VISHING
Encryption
Hacker
Trojan Horse
SECURITY AWARENESS
Information Security
PASSWORD SPRAYING
CYBERSECURITY AWARENESS MONTH
SHARING SENSITIVE DATA
MULTI-FACTOR AUTHENTICATION (MFA)
PASSWORD STRENGTH METER
BUSINESS EMAIL COMPROMISE (BEC)
KNOWBE4
PASSPHRASE
PHISHING
MALWARE
VPN (Virtual Private Network)
IDENTITY THEFT
ARTIFICIAL INTELLIGENCE
Data Breach