VirusVPN(VirtualPrivateNetwork)SMISHINGCHATGPTSECURITYAWARENESSMULTI-FACTORAUTHENTICATION(MFA)QRCodeScamsMobileApplicationManagement(MAM)DataBreachSOCIALENGINEERINGMALWAREHackerIDENTITYTHEFTPASSWORDSTRENGTHMETERBUSINESSEMAILCOMPROMISE(BEC)SocialMediaScamsTrojanHorseANNUALSECURITYTRAININGVISHINGSpoofingARTIFICIALINTELLIGENCESHARINGSENSITIVEDATAEncryptionRANSOMWAREPublicWi-FiCYBERSECURITYAWARENESSMONTHPHISHINGCloudSecurityDataPrivacyInternetofThingsPolicyTechPASSWORDSPRAYINGPASSPHRASEPhishAlertButton(PAB)InformationSecurityKNOWBE4USBCYBERSECURITYHYGIENEVirusVPN(VirtualPrivateNetwork)SMISHINGCHATGPTSECURITYAWARENESSMULTI-FACTORAUTHENTICATION(MFA)QRCodeScamsMobileApplicationManagement(MAM)DataBreachSOCIALENGINEERINGMALWAREHackerIDENTITYTHEFTPASSWORDSTRENGTHMETERBUSINESSEMAILCOMPROMISE(BEC)SocialMediaScamsTrojanHorseANNUALSECURITYTRAININGVISHINGSpoofingARTIFICIALINTELLIGENCESHARINGSENSITIVEDATAEncryptionRANSOMWAREPublicWi-FiCYBERSECURITYAWARENESSMONTHPHISHINGCloudSecurityDataPrivacyInternetofThingsPolicyTechPASSWORDSPRAYINGPASSPHRASEPhishAlertButton(PAB)InformationSecurityKNOWBE4USBCYBERSECURITYHYGIENE

Cybersecurity Superhero BINGO! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. Virus
  2. VPN (Virtual Private Network)
  3. SMISHING
  4. CHATGPT
  5. SECURITY AWARENESS
  6. MULTI-FACTOR AUTHENTICATION (MFA)
  7. QR Code Scams
  8. Mobile Application Management (MAM)
  9. Data Breach
  10. SOCIAL ENGINEERING
  11. MALWARE
  12. Hacker
  13. IDENTITY THEFT
  14. PASSWORD STRENGTH METER
  15. BUSINESS EMAIL COMPROMISE (BEC)
  16. Social Media Scams
  17. Trojan Horse
  18. ANNUAL SECURITY TRAINING
  19. VISHING
  20. Spoofing
  21. ARTIFICIAL INTELLIGENCE
  22. SHARING SENSITIVE DATA
  23. Encryption
  24. RANSOMWARE
  25. Public Wi-Fi
  26. CYBERSECURITY AWARENESS MONTH
  27. PHISHING
  28. Cloud Security
  29. Data Privacy
  30. Internet of Things
  31. PolicyTech
  32. PASSWORD SPRAYING
  33. PASSPHRASE
  34. Phish Alert Button (PAB)
  35. Information Security
  36. KNOWBE4
  37. USB
  38. CYBERSECURITY HYGIENE