PASSWORDSTRENGTHMETERKNOWBE4EncryptionCloudSecuritySMISHINGInformationSecuritySocialMediaScamsQRCodeScamsSpoofingUSBMobileApplicationManagement(MAM)BUSINESSEMAILCOMPROMISE(BEC)HackerRANSOMWAREVISHINGSOCIALENGINEERINGIDENTITYTHEFTPASSWORDSPRAYINGVPN(VirtualPrivateNetwork)PHISHINGPublicWi-FiVirusMALWAREANNUALSECURITYTRAININGPASSPHRASESHARINGSENSITIVEDATAPhishAlertButton(PAB)ARTIFICIALINTELLIGENCEDataBreachDataPrivacyCYBERSECURITYAWARENESSMONTHPolicyTechMULTI-FACTORAUTHENTICATION(MFA)SECURITYAWARENESSInternetofThingsTrojanHorseCYBERSECURITYHYGIENECHATGPTPASSWORDSTRENGTHMETERKNOWBE4EncryptionCloudSecuritySMISHINGInformationSecuritySocialMediaScamsQRCodeScamsSpoofingUSBMobileApplicationManagement(MAM)BUSINESSEMAILCOMPROMISE(BEC)HackerRANSOMWAREVISHINGSOCIALENGINEERINGIDENTITYTHEFTPASSWORDSPRAYINGVPN(VirtualPrivateNetwork)PHISHINGPublicWi-FiVirusMALWAREANNUALSECURITYTRAININGPASSPHRASESHARINGSENSITIVEDATAPhishAlertButton(PAB)ARTIFICIALINTELLIGENCEDataBreachDataPrivacyCYBERSECURITYAWARENESSMONTHPolicyTechMULTI-FACTORAUTHENTICATION(MFA)SECURITYAWARENESSInternetofThingsTrojanHorseCYBERSECURITYHYGIENECHATGPT

Cybersecurity Superhero BINGO! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. PASSWORD STRENGTH METER
  2. KNOWBE4
  3. Encryption
  4. Cloud Security
  5. SMISHING
  6. Information Security
  7. Social Media Scams
  8. QR Code Scams
  9. Spoofing
  10. USB
  11. Mobile Application Management (MAM)
  12. BUSINESS EMAIL COMPROMISE (BEC)
  13. Hacker
  14. RANSOMWARE
  15. VISHING
  16. SOCIAL ENGINEERING
  17. IDENTITY THEFT
  18. PASSWORD SPRAYING
  19. VPN (Virtual Private Network)
  20. PHISHING
  21. Public Wi-Fi
  22. Virus
  23. MALWARE
  24. ANNUAL SECURITY TRAINING
  25. PASSPHRASE
  26. SHARING SENSITIVE DATA
  27. Phish Alert Button (PAB)
  28. ARTIFICIAL INTELLIGENCE
  29. Data Breach
  30. Data Privacy
  31. CYBERSECURITY AWARENESS MONTH
  32. PolicyTech
  33. MULTI-FACTOR AUTHENTICATION (MFA)
  34. SECURITY AWARENESS
  35. Internet of Things
  36. Trojan Horse
  37. CYBERSECURITY HYGIENE
  38. CHATGPT