PASSWORD STRENGTH METER KNOWBE4 Encryption Cloud Security SMISHING Information Security Social Media Scams QR Code Scams Spoofing USB Mobile Application Management (MAM) BUSINESS EMAIL COMPROMISE (BEC) Hacker RANSOMWARE VISHING SOCIAL ENGINEERING IDENTITY THEFT PASSWORD SPRAYING VPN (Virtual Private Network) PHISHING Public Wi-Fi Virus MALWARE ANNUAL SECURITY TRAINING PASSPHRASE SHARING SENSITIVE DATA Phish Alert Button (PAB) ARTIFICIAL INTELLIGENCE Data Breach Data Privacy CYBERSECURITY AWARENESS MONTH PolicyTech MULTI-FACTOR AUTHENTICATION (MFA) SECURITY AWARENESS Internet of Things Trojan Horse CYBERSECURITY HYGIENE CHATGPT PASSWORD STRENGTH METER KNOWBE4 Encryption Cloud Security SMISHING Information Security Social Media Scams QR Code Scams Spoofing USB Mobile Application Management (MAM) BUSINESS EMAIL COMPROMISE (BEC) Hacker RANSOMWARE VISHING SOCIAL ENGINEERING IDENTITY THEFT PASSWORD SPRAYING VPN (Virtual Private Network) PHISHING Public Wi-Fi Virus MALWARE ANNUAL SECURITY TRAINING PASSPHRASE SHARING SENSITIVE DATA Phish Alert Button (PAB) ARTIFICIAL INTELLIGENCE Data Breach Data Privacy CYBERSECURITY AWARENESS MONTH PolicyTech MULTI-FACTOR AUTHENTICATION (MFA) SECURITY AWARENESS Internet of Things Trojan Horse CYBERSECURITY HYGIENE CHATGPT
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
PASSWORD STRENGTH METER
KNOWBE4
Encryption
Cloud Security
SMISHING
Information Security
Social Media Scams
QR Code Scams
Spoofing
USB
Mobile Application Management (MAM)
BUSINESS EMAIL COMPROMISE (BEC)
Hacker
RANSOMWARE
VISHING
SOCIAL ENGINEERING
IDENTITY THEFT
PASSWORD SPRAYING
VPN (Virtual Private Network)
PHISHING
Public Wi-Fi
Virus
MALWARE
ANNUAL SECURITY TRAINING
PASSPHRASE
SHARING SENSITIVE DATA
Phish Alert Button (PAB)
ARTIFICIAL INTELLIGENCE
Data Breach
Data Privacy
CYBERSECURITY AWARENESS MONTH
PolicyTech
MULTI-FACTOR AUTHENTICATION (MFA)
SECURITY AWARENESS
Internet of Things
Trojan Horse
CYBERSECURITY HYGIENE
CHATGPT