CYBERSECURITY HYGIENE Cloud Security PASSPHRASE Trojan Horse SMISHING PASSWORD STRENGTH METER MALWARE SOCIAL ENGINEERING RANSOMWARE Mobile Application Management (MAM) USB ARTIFICIAL INTELLIGENCE PASSWORD SPRAYING CYBERSECURITY AWARENESS MONTH VPN (Virtual Private Network) Data Privacy PHISHING MULTI-FACTOR AUTHENTICATION (MFA) SECURITY AWARENESS PolicyTech Hacker Virus CHATGPT QR Code Scams Data Breach IDENTITY THEFT Public Wi-Fi Encryption Information Security Internet of Things SHARING SENSITIVE DATA Social Media Scams ANNUAL SECURITY TRAINING VISHING BUSINESS EMAIL COMPROMISE (BEC) Phish Alert Button (PAB) KNOWBE4 Spoofing CYBERSECURITY HYGIENE Cloud Security PASSPHRASE Trojan Horse SMISHING PASSWORD STRENGTH METER MALWARE SOCIAL ENGINEERING RANSOMWARE Mobile Application Management (MAM) USB ARTIFICIAL INTELLIGENCE PASSWORD SPRAYING CYBERSECURITY AWARENESS MONTH VPN (Virtual Private Network) Data Privacy PHISHING MULTI-FACTOR AUTHENTICATION (MFA) SECURITY AWARENESS PolicyTech Hacker Virus CHATGPT QR Code Scams Data Breach IDENTITY THEFT Public Wi-Fi Encryption Information Security Internet of Things SHARING SENSITIVE DATA Social Media Scams ANNUAL SECURITY TRAINING VISHING BUSINESS EMAIL COMPROMISE (BEC) Phish Alert Button (PAB) KNOWBE4 Spoofing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
CYBERSECURITY HYGIENE
Cloud Security
PASSPHRASE
Trojan Horse
SMISHING
PASSWORD STRENGTH METER
MALWARE
SOCIAL ENGINEERING
RANSOMWARE
Mobile Application Management (MAM)
USB
ARTIFICIAL INTELLIGENCE
PASSWORD SPRAYING
CYBERSECURITY AWARENESS MONTH
VPN (Virtual Private Network)
Data Privacy
PHISHING
MULTI-FACTOR AUTHENTICATION (MFA)
SECURITY AWARENESS
PolicyTech
Hacker
Virus
CHATGPT
QR Code Scams
Data Breach
IDENTITY THEFT
Public Wi-Fi
Encryption
Information Security
Internet of Things
SHARING SENSITIVE DATA
Social Media Scams
ANNUAL SECURITY TRAINING
VISHING
BUSINESS EMAIL COMPROMISE (BEC)
Phish Alert Button (PAB)
KNOWBE4
Spoofing