MobileApplicationManagement(MAM)HackerVPN(VirtualPrivateNetwork)SMISHINGSHARINGSENSITIVEDATAMULTI-FACTORAUTHENTICATION(MFA)USBCYBERSECURITYAWARENESSMONTHPASSWORDSTRENGTHMETERKNOWBE4InternetofThingsRANSOMWAREPHISHINGSECURITYAWARENESSPhishAlertButton(PAB)PublicWi-FiCloudSecurityPolicyTechSOCIALENGINEERINGMALWAREBUSINESSEMAILCOMPROMISE(BEC)InformationSecurityIDENTITYTHEFTSpoofingSocialMediaScamsVirusTrojanHorseCYBERSECURITYHYGIENEDataBreachPASSPHRASEEncryptionVISHINGQRCodeScamsCHATGPTANNUALSECURITYTRAININGARTIFICIALINTELLIGENCEPASSWORDSPRAYINGDataPrivacyMobileApplicationManagement(MAM)HackerVPN(VirtualPrivateNetwork)SMISHINGSHARINGSENSITIVEDATAMULTI-FACTORAUTHENTICATION(MFA)USBCYBERSECURITYAWARENESSMONTHPASSWORDSTRENGTHMETERKNOWBE4InternetofThingsRANSOMWAREPHISHINGSECURITYAWARENESSPhishAlertButton(PAB)PublicWi-FiCloudSecurityPolicyTechSOCIALENGINEERINGMALWAREBUSINESSEMAILCOMPROMISE(BEC)InformationSecurityIDENTITYTHEFTSpoofingSocialMediaScamsVirusTrojanHorseCYBERSECURITYHYGIENEDataBreachPASSPHRASEEncryptionVISHINGQRCodeScamsCHATGPTANNUALSECURITYTRAININGARTIFICIALINTELLIGENCEPASSWORDSPRAYINGDataPrivacy

Cybersecurity Superhero BINGO! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. Mobile Application Management (MAM)
  2. Hacker
  3. VPN (Virtual Private Network)
  4. SMISHING
  5. SHARING SENSITIVE DATA
  6. MULTI-FACTOR AUTHENTICATION (MFA)
  7. USB
  8. CYBERSECURITY AWARENESS MONTH
  9. PASSWORD STRENGTH METER
  10. KNOWBE4
  11. Internet of Things
  12. RANSOMWARE
  13. PHISHING
  14. SECURITY AWARENESS
  15. Phish Alert Button (PAB)
  16. Public Wi-Fi
  17. Cloud Security
  18. PolicyTech
  19. SOCIAL ENGINEERING
  20. MALWARE
  21. BUSINESS EMAIL COMPROMISE (BEC)
  22. Information Security
  23. IDENTITY THEFT
  24. Spoofing
  25. Social Media Scams
  26. Virus
  27. Trojan Horse
  28. CYBERSECURITY HYGIENE
  29. Data Breach
  30. PASSPHRASE
  31. Encryption
  32. VISHING
  33. QR Code Scams
  34. CHATGPT
  35. ANNUAL SECURITY TRAINING
  36. ARTIFICIAL INTELLIGENCE
  37. PASSWORD SPRAYING
  38. Data Privacy