CYBERSECURITY AWARENESS MONTH Cloud Security MULTI-FACTOR AUTHENTICATION (MFA) Data Privacy KNOWBE4 PolicyTech MALWARE SECURITY AWARENESS Information Security Mobile Application Management (MAM) RANSOMWARE PASSWORD SPRAYING PASSPHRASE Spoofing VPN (Virtual Private Network) SOCIAL ENGINEERING Virus ANNUAL SECURITY TRAINING Hacker Phish Alert Button (PAB) VISHING CHATGPT SHARING SENSITIVE DATA USB CYBERSECURITY HYGIENE SMISHING IDENTITY THEFT Data Breach PASSWORD STRENGTH METER Trojan Horse BUSINESS EMAIL COMPROMISE (BEC) ARTIFICIAL INTELLIGENCE Internet of Things PHISHING QR Code Scams Public Wi-Fi Encryption Social Media Scams CYBERSECURITY AWARENESS MONTH Cloud Security MULTI-FACTOR AUTHENTICATION (MFA) Data Privacy KNOWBE4 PolicyTech MALWARE SECURITY AWARENESS Information Security Mobile Application Management (MAM) RANSOMWARE PASSWORD SPRAYING PASSPHRASE Spoofing VPN (Virtual Private Network) SOCIAL ENGINEERING Virus ANNUAL SECURITY TRAINING Hacker Phish Alert Button (PAB) VISHING CHATGPT SHARING SENSITIVE DATA USB CYBERSECURITY HYGIENE SMISHING IDENTITY THEFT Data Breach PASSWORD STRENGTH METER Trojan Horse BUSINESS EMAIL COMPROMISE (BEC) ARTIFICIAL INTELLIGENCE Internet of Things PHISHING QR Code Scams Public Wi-Fi Encryption Social Media Scams
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
CYBERSECURITY AWARENESS MONTH
Cloud Security
MULTI-FACTOR AUTHENTICATION (MFA)
Data Privacy
KNOWBE4
PolicyTech
MALWARE
SECURITY AWARENESS
Information Security
Mobile Application Management (MAM)
RANSOMWARE
PASSWORD SPRAYING
PASSPHRASE
Spoofing
VPN (Virtual Private Network)
SOCIAL ENGINEERING
Virus
ANNUAL SECURITY TRAINING
Hacker
Phish Alert Button (PAB)
VISHING
CHATGPT
SHARING SENSITIVE DATA
USB
CYBERSECURITY HYGIENE
SMISHING
IDENTITY THEFT
Data Breach
PASSWORD STRENGTH METER
Trojan Horse
BUSINESS EMAIL COMPROMISE (BEC)
ARTIFICIAL INTELLIGENCE
Internet of Things
PHISHING
QR Code Scams
Public Wi-Fi
Encryption
Social Media Scams