PASSPHRASE CYBERSECURITY HYGIENE BUSINESS EMAIL COMPROMISE (BEC) PASSWORD STRENGTH METER IDENTITY THEFT SOCIAL ENGINEERING Hacker KNOWBE4 MALWARE USB CHATGPT Encryption Data Breach VPN (Virtual Private Network) Cloud Security Data Privacy Trojan Horse QR Code Scams ARTIFICIAL INTELLIGENCE SMISHING ANNUAL SECURITY TRAINING SHARING SENSITIVE DATA CYBERSECURITY AWARENESS MONTH SECURITY AWARENESS PASSWORD SPRAYING VISHING Spoofing Mobile Application Management (MAM) PolicyTech PHISHING Public Wi-Fi Virus RANSOMWARE Information Security Phish Alert Button (PAB) Internet of Things Social Media Scams MULTI-FACTOR AUTHENTICATION (MFA) PASSPHRASE CYBERSECURITY HYGIENE BUSINESS EMAIL COMPROMISE (BEC) PASSWORD STRENGTH METER IDENTITY THEFT SOCIAL ENGINEERING Hacker KNOWBE4 MALWARE USB CHATGPT Encryption Data Breach VPN (Virtual Private Network) Cloud Security Data Privacy Trojan Horse QR Code Scams ARTIFICIAL INTELLIGENCE SMISHING ANNUAL SECURITY TRAINING SHARING SENSITIVE DATA CYBERSECURITY AWARENESS MONTH SECURITY AWARENESS PASSWORD SPRAYING VISHING Spoofing Mobile Application Management (MAM) PolicyTech PHISHING Public Wi-Fi Virus RANSOMWARE Information Security Phish Alert Button (PAB) Internet of Things Social Media Scams MULTI-FACTOR AUTHENTICATION (MFA)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
PASSPHRASE
CYBERSECURITY HYGIENE
BUSINESS EMAIL COMPROMISE (BEC)
PASSWORD STRENGTH METER
IDENTITY THEFT
SOCIAL ENGINEERING
Hacker
KNOWBE4
MALWARE
USB
CHATGPT
Encryption
Data Breach
VPN (Virtual Private Network)
Cloud Security
Data Privacy
Trojan Horse
QR Code Scams
ARTIFICIAL INTELLIGENCE
SMISHING
ANNUAL SECURITY TRAINING
SHARING SENSITIVE DATA
CYBERSECURITY AWARENESS MONTH
SECURITY AWARENESS
PASSWORD SPRAYING
VISHING
Spoofing
Mobile Application Management (MAM)
PolicyTech
PHISHING
Public Wi-Fi
Virus
RANSOMWARE
Information Security
Phish Alert Button (PAB)
Internet of Things
Social Media Scams
MULTI-FACTOR AUTHENTICATION (MFA)