Internet of Things Data Breach PHISHING Mobile Application Management (MAM) PASSPHRASE Virus CHATGPT VPN (Virtual Private Network) KNOWBE4 VISHING Hacker ARTIFICIAL INTELLIGENCE Data Privacy PASSWORD STRENGTH METER CYBERSECURITY AWARENESS MONTH Information Security SECURITY AWARENESS IDENTITY THEFT ANNUAL SECURITY TRAINING RANSOMWARE Encryption MALWARE SMISHING SOCIAL ENGINEERING MULTI-FACTOR AUTHENTICATION (MFA) QR Code Scams Public Wi-Fi CYBERSECURITY HYGIENE Social Media Scams SHARING SENSITIVE DATA PASSWORD SPRAYING USB PolicyTech Trojan Horse Phish Alert Button (PAB) Spoofing Cloud Security BUSINESS EMAIL COMPROMISE (BEC) Internet of Things Data Breach PHISHING Mobile Application Management (MAM) PASSPHRASE Virus CHATGPT VPN (Virtual Private Network) KNOWBE4 VISHING Hacker ARTIFICIAL INTELLIGENCE Data Privacy PASSWORD STRENGTH METER CYBERSECURITY AWARENESS MONTH Information Security SECURITY AWARENESS IDENTITY THEFT ANNUAL SECURITY TRAINING RANSOMWARE Encryption MALWARE SMISHING SOCIAL ENGINEERING MULTI-FACTOR AUTHENTICATION (MFA) QR Code Scams Public Wi-Fi CYBERSECURITY HYGIENE Social Media Scams SHARING SENSITIVE DATA PASSWORD SPRAYING USB PolicyTech Trojan Horse Phish Alert Button (PAB) Spoofing Cloud Security BUSINESS EMAIL COMPROMISE (BEC)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Internet of Things
Data Breach
PHISHING
Mobile Application Management (MAM)
PASSPHRASE
Virus
CHATGPT
VPN (Virtual Private Network)
KNOWBE4
VISHING
Hacker
ARTIFICIAL INTELLIGENCE
Data Privacy
PASSWORD STRENGTH METER
CYBERSECURITY AWARENESS MONTH
Information Security
SECURITY AWARENESS
IDENTITY THEFT
ANNUAL SECURITY TRAINING
RANSOMWARE
Encryption
MALWARE
SMISHING
SOCIAL ENGINEERING
MULTI-FACTOR AUTHENTICATION (MFA)
QR Code Scams
Public Wi-Fi
CYBERSECURITY HYGIENE
Social Media Scams
SHARING SENSITIVE DATA
PASSWORD SPRAYING
USB
PolicyTech
Trojan Horse
Phish Alert Button (PAB)
Spoofing
Cloud Security
BUSINESS EMAIL COMPROMISE (BEC)