MULTI-FACTORAUTHENTICATION(MFA)TrojanHorseCHATGPTMobileApplicationManagement(MAM)PhishAlertButton(PAB)CYBERSECURITYHYGIENEDataPrivacyInformationSecurityVirusSOCIALENGINEERINGSpoofingMALWAREUSBCYBERSECURITYAWARENESSMONTHPublicWi-FiRANSOMWAREDataBreachBUSINESSEMAILCOMPROMISE(BEC)PASSWORDSPRAYINGSocialMediaScamsPolicyTechARTIFICIALINTELLIGENCEInternetofThingsPASSWORDSTRENGTHMETERKNOWBE4SMISHINGVISHINGPASSPHRASEEncryptionSHARINGSENSITIVEDATAVPN(VirtualPrivateNetwork)IDENTITYTHEFTCloudSecurityHackerSECURITYAWARENESSANNUALSECURITYTRAININGPHISHINGQRCodeScamsMULTI-FACTORAUTHENTICATION(MFA)TrojanHorseCHATGPTMobileApplicationManagement(MAM)PhishAlertButton(PAB)CYBERSECURITYHYGIENEDataPrivacyInformationSecurityVirusSOCIALENGINEERINGSpoofingMALWAREUSBCYBERSECURITYAWARENESSMONTHPublicWi-FiRANSOMWAREDataBreachBUSINESSEMAILCOMPROMISE(BEC)PASSWORDSPRAYINGSocialMediaScamsPolicyTechARTIFICIALINTELLIGENCEInternetofThingsPASSWORDSTRENGTHMETERKNOWBE4SMISHINGVISHINGPASSPHRASEEncryptionSHARINGSENSITIVEDATAVPN(VirtualPrivateNetwork)IDENTITYTHEFTCloudSecurityHackerSECURITYAWARENESSANNUALSECURITYTRAININGPHISHINGQRCodeScams

Cybersecurity Superhero BINGO! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. MULTI-FACTOR AUTHENTICATION (MFA)
  2. Trojan Horse
  3. CHATGPT
  4. Mobile Application Management (MAM)
  5. Phish Alert Button (PAB)
  6. CYBERSECURITY HYGIENE
  7. Data Privacy
  8. Information Security
  9. Virus
  10. SOCIAL ENGINEERING
  11. Spoofing
  12. MALWARE
  13. USB
  14. CYBERSECURITY AWARENESS MONTH
  15. Public Wi-Fi
  16. RANSOMWARE
  17. Data Breach
  18. BUSINESS EMAIL COMPROMISE (BEC)
  19. PASSWORD SPRAYING
  20. Social Media Scams
  21. PolicyTech
  22. ARTIFICIAL INTELLIGENCE
  23. Internet of Things
  24. PASSWORD STRENGTH METER
  25. KNOWBE4
  26. SMISHING
  27. VISHING
  28. PASSPHRASE
  29. Encryption
  30. SHARING SENSITIVE DATA
  31. VPN (Virtual Private Network)
  32. IDENTITY THEFT
  33. Cloud Security
  34. Hacker
  35. SECURITY AWARENESS
  36. ANNUAL SECURITY TRAINING
  37. PHISHING
  38. QR Code Scams