MALWARESocialMediaScamsPhishAlertButton(PAB)PASSWORDSTRENGTHMETERARTIFICIALINTELLIGENCECYBERSECURITYAWARENESSMONTHVPN(VirtualPrivateNetwork)CHATGPTKNOWBE4SMISHINGPASSPHRASERANSOMWAREVirusHackerPASSWORDSPRAYINGDataPrivacyCloudSecurityQRCodeScamsInformationSecurityPHISHINGDataBreachANNUALSECURITYTRAININGSHARINGSENSITIVEDATAVISHINGIDENTITYTHEFTInternetofThingsSpoofingEncryptionPolicyTechSOCIALENGINEERINGTrojanHorseUSBMULTI-FACTORAUTHENTICATION(MFA)PublicWi-FiMobileApplicationManagement(MAM)SECURITYAWARENESSCYBERSECURITYHYGIENEBUSINESSEMAILCOMPROMISE(BEC)MALWARESocialMediaScamsPhishAlertButton(PAB)PASSWORDSTRENGTHMETERARTIFICIALINTELLIGENCECYBERSECURITYAWARENESSMONTHVPN(VirtualPrivateNetwork)CHATGPTKNOWBE4SMISHINGPASSPHRASERANSOMWAREVirusHackerPASSWORDSPRAYINGDataPrivacyCloudSecurityQRCodeScamsInformationSecurityPHISHINGDataBreachANNUALSECURITYTRAININGSHARINGSENSITIVEDATAVISHINGIDENTITYTHEFTInternetofThingsSpoofingEncryptionPolicyTechSOCIALENGINEERINGTrojanHorseUSBMULTI-FACTORAUTHENTICATION(MFA)PublicWi-FiMobileApplicationManagement(MAM)SECURITYAWARENESSCYBERSECURITYHYGIENEBUSINESSEMAILCOMPROMISE(BEC)

Cybersecurity Superhero BINGO! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. MALWARE
  2. Social Media Scams
  3. Phish Alert Button (PAB)
  4. PASSWORD STRENGTH METER
  5. ARTIFICIAL INTELLIGENCE
  6. CYBERSECURITY AWARENESS MONTH
  7. VPN (Virtual Private Network)
  8. CHATGPT
  9. KNOWBE4
  10. SMISHING
  11. PASSPHRASE
  12. RANSOMWARE
  13. Virus
  14. Hacker
  15. PASSWORD SPRAYING
  16. Data Privacy
  17. Cloud Security
  18. QR Code Scams
  19. Information Security
  20. PHISHING
  21. Data Breach
  22. ANNUAL SECURITY TRAINING
  23. SHARING SENSITIVE DATA
  24. VISHING
  25. IDENTITY THEFT
  26. Internet of Things
  27. Spoofing
  28. Encryption
  29. PolicyTech
  30. SOCIAL ENGINEERING
  31. Trojan Horse
  32. USB
  33. MULTI-FACTOR AUTHENTICATION (MFA)
  34. Public Wi-Fi
  35. Mobile Application Management (MAM)
  36. SECURITY AWARENESS
  37. CYBERSECURITY HYGIENE
  38. BUSINESS EMAIL COMPROMISE (BEC)