PASSPHRASE PASSWORD STRENGTH METER Information Security CYBERSECURITY HYGIENE PASSWORD SPRAYING CYBERSECURITY AWARENESS MONTH SHARING SENSITIVE DATA ARTIFICIAL INTELLIGENCE Encryption RANSOMWARE ANNUAL SECURITY TRAINING VISHING SMISHING MULTI-FACTOR AUTHENTICATION (MFA) BUSINESS EMAIL COMPROMISE (BEC) SOCIAL ENGINEERING Internet of Things SECURITY AWARENESS KNOWBE4 Data Breach CHATGPT Hacker Cloud Security Spoofing Trojan Horse PHISHING MALWARE VPN (Virtual Private Network) IDENTITY THEFT PASSPHRASE PASSWORD STRENGTH METER Information Security CYBERSECURITY HYGIENE PASSWORD SPRAYING CYBERSECURITY AWARENESS MONTH SHARING SENSITIVE DATA ARTIFICIAL INTELLIGENCE Encryption RANSOMWARE ANNUAL SECURITY TRAINING VISHING SMISHING MULTI-FACTOR AUTHENTICATION (MFA) BUSINESS EMAIL COMPROMISE (BEC) SOCIAL ENGINEERING Internet of Things SECURITY AWARENESS KNOWBE4 Data Breach CHATGPT Hacker Cloud Security Spoofing Trojan Horse PHISHING MALWARE VPN (Virtual Private Network) IDENTITY THEFT
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
PASSPHRASE
PASSWORD STRENGTH METER
Information Security
CYBERSECURITY HYGIENE
PASSWORD SPRAYING
CYBERSECURITY AWARENESS MONTH
SHARING SENSITIVE DATA
ARTIFICIAL INTELLIGENCE
Encryption
RANSOMWARE
ANNUAL SECURITY TRAINING
VISHING
SMISHING
MULTI-FACTOR AUTHENTICATION (MFA)
BUSINESS EMAIL COMPROMISE (BEC)
SOCIAL ENGINEERING
Internet of Things
SECURITY AWARENESS
KNOWBE4
Data Breach
CHATGPT
Hacker
Cloud Security
Spoofing
Trojan Horse
PHISHING
MALWARE
VPN (Virtual Private Network)
IDENTITY THEFT