PASSPHRASEPASSWORDSTRENGTHMETERInformationSecurityCYBERSECURITYHYGIENEPASSWORDSPRAYINGCYBERSECURITYAWARENESSMONTHSHARINGSENSITIVEDATAARTIFICIALINTELLIGENCEEncryptionRANSOMWAREANNUALSECURITYTRAININGVISHINGSMISHINGMULTI-FACTORAUTHENTICATION(MFA)BUSINESSEMAILCOMPROMISE(BEC)SOCIALENGINEERINGInternetofThingsSECURITYAWARENESSKNOWBE4DataBreachCHATGPTHackerCloudSecuritySpoofingTrojanHorsePHISHINGMALWAREVPN(VirtualPrivateNetwork)IDENTITYTHEFTPASSPHRASEPASSWORDSTRENGTHMETERInformationSecurityCYBERSECURITYHYGIENEPASSWORDSPRAYINGCYBERSECURITYAWARENESSMONTHSHARINGSENSITIVEDATAARTIFICIALINTELLIGENCEEncryptionRANSOMWAREANNUALSECURITYTRAININGVISHINGSMISHINGMULTI-FACTORAUTHENTICATION(MFA)BUSINESSEMAILCOMPROMISE(BEC)SOCIALENGINEERINGInternetofThingsSECURITYAWARENESSKNOWBE4DataBreachCHATGPTHackerCloudSecuritySpoofingTrojanHorsePHISHINGMALWAREVPN(VirtualPrivateNetwork)IDENTITYTHEFT

Cybersecurity Superhero BINGO! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. PASSPHRASE
  2. PASSWORD STRENGTH METER
  3. Information Security
  4. CYBERSECURITY HYGIENE
  5. PASSWORD SPRAYING
  6. CYBERSECURITY AWARENESS MONTH
  7. SHARING SENSITIVE DATA
  8. ARTIFICIAL INTELLIGENCE
  9. Encryption
  10. RANSOMWARE
  11. ANNUAL SECURITY TRAINING
  12. VISHING
  13. SMISHING
  14. MULTI-FACTOR AUTHENTICATION (MFA)
  15. BUSINESS EMAIL COMPROMISE (BEC)
  16. SOCIAL ENGINEERING
  17. Internet of Things
  18. SECURITY AWARENESS
  19. KNOWBE4
  20. Data Breach
  21. CHATGPT
  22. Hacker
  23. Cloud Security
  24. Spoofing
  25. Trojan Horse
  26. PHISHING
  27. MALWARE
  28. VPN (Virtual Private Network)
  29. IDENTITY THEFT