Information Security CYBERSECURITY HYGIENE PASSWORD SPRAYING PASSWORD STRENGTH METER CHATGPT SECURITY AWARENESS Cloud Security MALWARE Trojan Horse Encryption ANNUAL SECURITY TRAINING SOCIAL ENGINEERING IDENTITY THEFT Spoofing BUSINESS EMAIL COMPROMISE (BEC) RANSOMWARE PASSPHRASE PHISHING ARTIFICIAL INTELLIGENCE VPN (Virtual Private Network) CYBERSECURITY AWARENESS MONTH KNOWBE4 SMISHING Data Breach VISHING SHARING SENSITIVE DATA MULTI-FACTOR AUTHENTICATION (MFA) Internet of Things Hacker Information Security CYBERSECURITY HYGIENE PASSWORD SPRAYING PASSWORD STRENGTH METER CHATGPT SECURITY AWARENESS Cloud Security MALWARE Trojan Horse Encryption ANNUAL SECURITY TRAINING SOCIAL ENGINEERING IDENTITY THEFT Spoofing BUSINESS EMAIL COMPROMISE (BEC) RANSOMWARE PASSPHRASE PHISHING ARTIFICIAL INTELLIGENCE VPN (Virtual Private Network) CYBERSECURITY AWARENESS MONTH KNOWBE4 SMISHING Data Breach VISHING SHARING SENSITIVE DATA MULTI-FACTOR AUTHENTICATION (MFA) Internet of Things Hacker
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Information Security
CYBERSECURITY HYGIENE
PASSWORD SPRAYING
PASSWORD STRENGTH METER
CHATGPT
SECURITY AWARENESS
Cloud Security
MALWARE
Trojan Horse
Encryption
ANNUAL SECURITY TRAINING
SOCIAL ENGINEERING
IDENTITY THEFT
Spoofing
BUSINESS EMAIL COMPROMISE (BEC)
RANSOMWARE
PASSPHRASE
PHISHING
ARTIFICIAL INTELLIGENCE
VPN (Virtual Private Network)
CYBERSECURITY AWARENESS MONTH
KNOWBE4
SMISHING
Data Breach
VISHING
SHARING SENSITIVE DATA
MULTI-FACTOR AUTHENTICATION (MFA)
Internet of Things
Hacker