SHARINGSENSITIVEDATAUSBIDENTITYTHEFTCYBERSECURITYHYGIENEANNUALSECURITYTRAININGSOCIALENGINEERINGPHISHINGKNOWBE4DataPrivacyRANSOMWAREMobileApplicationManagement(MAM)SECURITYAWARENESSPolicyTechARTIFICIALINTELLIGENCEInformationSecurityMULTI-FACTORAUTHENTICATION(MFA)PASSPHRASEVPN(VirtualPrivateNetwork)PASSWORDSPRAYINGBUSINESSEMAILCOMPROMISE(BEC)PASSWORDSTRENGTHMETERDataBreachCloudSecurityQRCodeScamsCHATGPTSMISHINGVirusEncryptionSpoofingMALWARESocialMediaScamsTrojanHorsePublicWi-FiHackerPhishAlertButton(PAB)InternetofThingsVISHINGCYBERSECURITYAWARENESSMONTHSHARINGSENSITIVEDATAUSBIDENTITYTHEFTCYBERSECURITYHYGIENEANNUALSECURITYTRAININGSOCIALENGINEERINGPHISHINGKNOWBE4DataPrivacyRANSOMWAREMobileApplicationManagement(MAM)SECURITYAWARENESSPolicyTechARTIFICIALINTELLIGENCEInformationSecurityMULTI-FACTORAUTHENTICATION(MFA)PASSPHRASEVPN(VirtualPrivateNetwork)PASSWORDSPRAYINGBUSINESSEMAILCOMPROMISE(BEC)PASSWORDSTRENGTHMETERDataBreachCloudSecurityQRCodeScamsCHATGPTSMISHINGVirusEncryptionSpoofingMALWARESocialMediaScamsTrojanHorsePublicWi-FiHackerPhishAlertButton(PAB)InternetofThingsVISHINGCYBERSECURITYAWARENESSMONTH

Cybersecurity Superhero BINGO! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. SHARING SENSITIVE DATA
  2. USB
  3. IDENTITY THEFT
  4. CYBERSECURITY HYGIENE
  5. ANNUAL SECURITY TRAINING
  6. SOCIAL ENGINEERING
  7. PHISHING
  8. KNOWBE4
  9. Data Privacy
  10. RANSOMWARE
  11. Mobile Application Management (MAM)
  12. SECURITY AWARENESS
  13. PolicyTech
  14. ARTIFICIAL INTELLIGENCE
  15. Information Security
  16. MULTI-FACTOR AUTHENTICATION (MFA)
  17. PASSPHRASE
  18. VPN (Virtual Private Network)
  19. PASSWORD SPRAYING
  20. BUSINESS EMAIL COMPROMISE (BEC)
  21. PASSWORD STRENGTH METER
  22. Data Breach
  23. Cloud Security
  24. QR Code Scams
  25. CHATGPT
  26. SMISHING
  27. Virus
  28. Encryption
  29. Spoofing
  30. MALWARE
  31. Social Media Scams
  32. Trojan Horse
  33. Public Wi-Fi
  34. Hacker
  35. Phish Alert Button (PAB)
  36. Internet of Things
  37. VISHING
  38. CYBERSECURITY AWARENESS MONTH