MULTI-FACTORAUTHENTICATION(MFA)PHISHINGVPN(VirtualPrivateNetwork)SHARINGSENSITIVEDATAVISHINGSpoofingSMISHINGARTIFICIALINTELLIGENCEInternetofThingsUSBTrojanHorseCHATGPTPASSPHRASECYBERSECURITYAWARENESSMONTHVirusInformationSecurityCYBERSECURITYHYGIENEDataBreachIDENTITYTHEFTMALWAREKNOWBE4ANNUALSECURITYTRAININGMobileApplicationManagement(MAM)SOCIALENGINEERINGCloudSecurityBUSINESSEMAILCOMPROMISE(BEC)PASSWORDSTRENGTHMETERHackerPolicyTechEncryptionDataPrivacyRANSOMWAREPublicWi-FiQRCodeScamsPhishAlertButton(PAB)SocialMediaScamsSECURITYAWARENESSPASSWORDSPRAYINGMULTI-FACTORAUTHENTICATION(MFA)PHISHINGVPN(VirtualPrivateNetwork)SHARINGSENSITIVEDATAVISHINGSpoofingSMISHINGARTIFICIALINTELLIGENCEInternetofThingsUSBTrojanHorseCHATGPTPASSPHRASECYBERSECURITYAWARENESSMONTHVirusInformationSecurityCYBERSECURITYHYGIENEDataBreachIDENTITYTHEFTMALWAREKNOWBE4ANNUALSECURITYTRAININGMobileApplicationManagement(MAM)SOCIALENGINEERINGCloudSecurityBUSINESSEMAILCOMPROMISE(BEC)PASSWORDSTRENGTHMETERHackerPolicyTechEncryptionDataPrivacyRANSOMWAREPublicWi-FiQRCodeScamsPhishAlertButton(PAB)SocialMediaScamsSECURITYAWARENESSPASSWORDSPRAYING

Cybersecurity Superhero BINGO! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. MULTI-FACTOR AUTHENTICATION (MFA)
  2. PHISHING
  3. VPN (Virtual Private Network)
  4. SHARING SENSITIVE DATA
  5. VISHING
  6. Spoofing
  7. SMISHING
  8. ARTIFICIAL INTELLIGENCE
  9. Internet of Things
  10. USB
  11. Trojan Horse
  12. CHATGPT
  13. PASSPHRASE
  14. CYBERSECURITY AWARENESS MONTH
  15. Virus
  16. Information Security
  17. CYBERSECURITY HYGIENE
  18. Data Breach
  19. IDENTITY THEFT
  20. MALWARE
  21. KNOWBE4
  22. ANNUAL SECURITY TRAINING
  23. Mobile Application Management (MAM)
  24. SOCIAL ENGINEERING
  25. Cloud Security
  26. BUSINESS EMAIL COMPROMISE (BEC)
  27. PASSWORD STRENGTH METER
  28. Hacker
  29. PolicyTech
  30. Encryption
  31. Data Privacy
  32. RANSOMWARE
  33. Public Wi-Fi
  34. QR Code Scams
  35. Phish Alert Button (PAB)
  36. Social Media Scams
  37. SECURITY AWARENESS
  38. PASSWORD SPRAYING