MALWARE Social Media Scams Phish Alert Button (PAB) PASSWORD STRENGTH METER ARTIFICIAL INTELLIGENCE CYBERSECURITY AWARENESS MONTH VPN (Virtual Private Network) CHATGPT KNOWBE4 SMISHING PASSPHRASE RANSOMWARE Virus Hacker PASSWORD SPRAYING Data Privacy Cloud Security QR Code Scams Information Security PHISHING Data Breach ANNUAL SECURITY TRAINING SHARING SENSITIVE DATA VISHING IDENTITY THEFT Internet of Things Spoofing Encryption PolicyTech SOCIAL ENGINEERING Trojan Horse USB MULTI-FACTOR AUTHENTICATION (MFA) Public Wi-Fi Mobile Application Management (MAM) SECURITY AWARENESS CYBERSECURITY HYGIENE BUSINESS EMAIL COMPROMISE (BEC) MALWARE Social Media Scams Phish Alert Button (PAB) PASSWORD STRENGTH METER ARTIFICIAL INTELLIGENCE CYBERSECURITY AWARENESS MONTH VPN (Virtual Private Network) CHATGPT KNOWBE4 SMISHING PASSPHRASE RANSOMWARE Virus Hacker PASSWORD SPRAYING Data Privacy Cloud Security QR Code Scams Information Security PHISHING Data Breach ANNUAL SECURITY TRAINING SHARING SENSITIVE DATA VISHING IDENTITY THEFT Internet of Things Spoofing Encryption PolicyTech SOCIAL ENGINEERING Trojan Horse USB MULTI-FACTOR AUTHENTICATION (MFA) Public Wi-Fi Mobile Application Management (MAM) SECURITY AWARENESS CYBERSECURITY HYGIENE BUSINESS EMAIL COMPROMISE (BEC)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
MALWARE
Social Media Scams
Phish Alert Button (PAB)
PASSWORD STRENGTH METER
ARTIFICIAL INTELLIGENCE
CYBERSECURITY AWARENESS MONTH
VPN (Virtual Private Network)
CHATGPT
KNOWBE4
SMISHING
PASSPHRASE
RANSOMWARE
Virus
Hacker
PASSWORD SPRAYING
Data Privacy
Cloud Security
QR Code Scams
Information Security
PHISHING
Data Breach
ANNUAL SECURITY TRAINING
SHARING SENSITIVE DATA
VISHING
IDENTITY THEFT
Internet of Things
Spoofing
Encryption
PolicyTech
SOCIAL ENGINEERING
Trojan Horse
USB
MULTI-FACTOR AUTHENTICATION (MFA)
Public Wi-Fi
Mobile Application Management (MAM)
SECURITY AWARENESS
CYBERSECURITY HYGIENE
BUSINESS EMAIL COMPROMISE (BEC)