SMISHING MULTI-FACTOR AUTHENTICATION (MFA) BUSINESS EMAIL COMPROMISE (BEC) CYBERSECURITY HYGIENE CHATGPT VISHING Spoofing SECURITY AWARENESS MALWARE PASSPHRASE Internet of Things Cloud Security Trojan Horse PASSWORD SPRAYING Information Security VPN (Virtual Private Network) IDENTITY THEFT CYBERSECURITY AWARENESS MONTH Hacker KNOWBE4 SOCIAL ENGINEERING RANSOMWARE PHISHING Data Breach Encryption ARTIFICIAL INTELLIGENCE SHARING SENSITIVE DATA PASSWORD STRENGTH METER ANNUAL SECURITY TRAINING SMISHING MULTI-FACTOR AUTHENTICATION (MFA) BUSINESS EMAIL COMPROMISE (BEC) CYBERSECURITY HYGIENE CHATGPT VISHING Spoofing SECURITY AWARENESS MALWARE PASSPHRASE Internet of Things Cloud Security Trojan Horse PASSWORD SPRAYING Information Security VPN (Virtual Private Network) IDENTITY THEFT CYBERSECURITY AWARENESS MONTH Hacker KNOWBE4 SOCIAL ENGINEERING RANSOMWARE PHISHING Data Breach Encryption ARTIFICIAL INTELLIGENCE SHARING SENSITIVE DATA PASSWORD STRENGTH METER ANNUAL SECURITY TRAINING
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
SMISHING
MULTI-FACTOR AUTHENTICATION (MFA)
BUSINESS EMAIL COMPROMISE (BEC)
CYBERSECURITY HYGIENE
CHATGPT
VISHING
Spoofing
SECURITY AWARENESS
MALWARE
PASSPHRASE
Internet of Things
Cloud Security
Trojan Horse
PASSWORD SPRAYING
Information Security
VPN (Virtual Private Network)
IDENTITY THEFT
CYBERSECURITY AWARENESS MONTH
Hacker
KNOWBE4
SOCIAL ENGINEERING
RANSOMWARE
PHISHING
Data Breach
Encryption
ARTIFICIAL INTELLIGENCE
SHARING SENSITIVE DATA
PASSWORD STRENGTH METER
ANNUAL SECURITY TRAINING