CYBERSECURITYHYGIENECloudSecurityPASSPHRASETrojanHorseSMISHINGPASSWORDSTRENGTHMETERMALWARESOCIALENGINEERINGRANSOMWAREMobileApplicationManagement(MAM)USBARTIFICIALINTELLIGENCEPASSWORDSPRAYINGCYBERSECURITYAWARENESSMONTHVPN(VirtualPrivateNetwork)DataPrivacyPHISHINGMULTI-FACTORAUTHENTICATION(MFA)SECURITYAWARENESSPolicyTechHackerVirusCHATGPTQRCodeScamsDataBreachIDENTITYTHEFTPublicWi-FiEncryptionInformationSecurityInternetofThingsSHARINGSENSITIVEDATASocialMediaScamsANNUALSECURITYTRAININGVISHINGBUSINESSEMAILCOMPROMISE(BEC)PhishAlertButton(PAB)KNOWBE4SpoofingCYBERSECURITYHYGIENECloudSecurityPASSPHRASETrojanHorseSMISHINGPASSWORDSTRENGTHMETERMALWARESOCIALENGINEERINGRANSOMWAREMobileApplicationManagement(MAM)USBARTIFICIALINTELLIGENCEPASSWORDSPRAYINGCYBERSECURITYAWARENESSMONTHVPN(VirtualPrivateNetwork)DataPrivacyPHISHINGMULTI-FACTORAUTHENTICATION(MFA)SECURITYAWARENESSPolicyTechHackerVirusCHATGPTQRCodeScamsDataBreachIDENTITYTHEFTPublicWi-FiEncryptionInformationSecurityInternetofThingsSHARINGSENSITIVEDATASocialMediaScamsANNUALSECURITYTRAININGVISHINGBUSINESSEMAILCOMPROMISE(BEC)PhishAlertButton(PAB)KNOWBE4Spoofing

Cybersecurity Superhero BINGO! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. CYBERSECURITY HYGIENE
  2. Cloud Security
  3. PASSPHRASE
  4. Trojan Horse
  5. SMISHING
  6. PASSWORD STRENGTH METER
  7. MALWARE
  8. SOCIAL ENGINEERING
  9. RANSOMWARE
  10. Mobile Application Management (MAM)
  11. USB
  12. ARTIFICIAL INTELLIGENCE
  13. PASSWORD SPRAYING
  14. CYBERSECURITY AWARENESS MONTH
  15. VPN (Virtual Private Network)
  16. Data Privacy
  17. PHISHING
  18. MULTI-FACTOR AUTHENTICATION (MFA)
  19. SECURITY AWARENESS
  20. PolicyTech
  21. Hacker
  22. Virus
  23. CHATGPT
  24. QR Code Scams
  25. Data Breach
  26. IDENTITY THEFT
  27. Public Wi-Fi
  28. Encryption
  29. Information Security
  30. Internet of Things
  31. SHARING SENSITIVE DATA
  32. Social Media Scams
  33. ANNUAL SECURITY TRAINING
  34. VISHING
  35. BUSINESS EMAIL COMPROMISE (BEC)
  36. Phish Alert Button (PAB)
  37. KNOWBE4
  38. Spoofing