BUSINESSEMAILCOMPROMISE(BEC)InformationSecurityCYBERSECURITYHYGIENEMALWAREVISHINGMULTI-FACTORAUTHENTICATION(MFA)ARTIFICIALINTELLIGENCESECURITYAWARENESSCloudSecurityEncryptionRANSOMWAREKNOWBE4IDENTITYTHEFTANNUALSECURITYTRAININGSOCIALENGINEERINGVPN(VirtualPrivateNetwork)PASSPHRASEHackerCHATGPTSMISHINGDataBreachPASSWORDSPRAYINGPHISHINGPASSWORDSTRENGTHMETERInternetofThingsSHARINGSENSITIVEDATASpoofingTrojanHorseCYBERSECURITYAWARENESSMONTHBUSINESSEMAILCOMPROMISE(BEC)InformationSecurityCYBERSECURITYHYGIENEMALWAREVISHINGMULTI-FACTORAUTHENTICATION(MFA)ARTIFICIALINTELLIGENCESECURITYAWARENESSCloudSecurityEncryptionRANSOMWAREKNOWBE4IDENTITYTHEFTANNUALSECURITYTRAININGSOCIALENGINEERINGVPN(VirtualPrivateNetwork)PASSPHRASEHackerCHATGPTSMISHINGDataBreachPASSWORDSPRAYINGPHISHINGPASSWORDSTRENGTHMETERInternetofThingsSHARINGSENSITIVEDATASpoofingTrojanHorseCYBERSECURITYAWARENESSMONTH

Cybersecurity Superhero BINGO! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. BUSINESS EMAIL COMPROMISE (BEC)
  2. Information Security
  3. CYBERSECURITY HYGIENE
  4. MALWARE
  5. VISHING
  6. MULTI-FACTOR AUTHENTICATION (MFA)
  7. ARTIFICIAL INTELLIGENCE
  8. SECURITY AWARENESS
  9. Cloud Security
  10. Encryption
  11. RANSOMWARE
  12. KNOWBE4
  13. IDENTITY THEFT
  14. ANNUAL SECURITY TRAINING
  15. SOCIAL ENGINEERING
  16. VPN (Virtual Private Network)
  17. PASSPHRASE
  18. Hacker
  19. CHATGPT
  20. SMISHING
  21. Data Breach
  22. PASSWORD SPRAYING
  23. PHISHING
  24. PASSWORD STRENGTH METER
  25. Internet of Things
  26. SHARING SENSITIVE DATA
  27. Spoofing
  28. Trojan Horse
  29. CYBERSECURITY AWARENESS MONTH