MULTI-FACTOR AUTHENTICATION (MFA) Trojan Horse CHATGPT Mobile Application Management (MAM) Phish Alert Button (PAB) CYBERSECURITY HYGIENE Data Privacy Information Security Virus SOCIAL ENGINEERING Spoofing MALWARE USB CYBERSECURITY AWARENESS MONTH Public Wi-Fi RANSOMWARE Data Breach BUSINESS EMAIL COMPROMISE (BEC) PASSWORD SPRAYING Social Media Scams PolicyTech ARTIFICIAL INTELLIGENCE Internet of Things PASSWORD STRENGTH METER KNOWBE4 SMISHING VISHING PASSPHRASE Encryption SHARING SENSITIVE DATA VPN (Virtual Private Network) IDENTITY THEFT Cloud Security Hacker SECURITY AWARENESS ANNUAL SECURITY TRAINING PHISHING QR Code Scams MULTI-FACTOR AUTHENTICATION (MFA) Trojan Horse CHATGPT Mobile Application Management (MAM) Phish Alert Button (PAB) CYBERSECURITY HYGIENE Data Privacy Information Security Virus SOCIAL ENGINEERING Spoofing MALWARE USB CYBERSECURITY AWARENESS MONTH Public Wi-Fi RANSOMWARE Data Breach BUSINESS EMAIL COMPROMISE (BEC) PASSWORD SPRAYING Social Media Scams PolicyTech ARTIFICIAL INTELLIGENCE Internet of Things PASSWORD STRENGTH METER KNOWBE4 SMISHING VISHING PASSPHRASE Encryption SHARING SENSITIVE DATA VPN (Virtual Private Network) IDENTITY THEFT Cloud Security Hacker SECURITY AWARENESS ANNUAL SECURITY TRAINING PHISHING QR Code Scams
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
MULTI-FACTOR AUTHENTICATION (MFA)
Trojan Horse
CHATGPT
Mobile Application Management (MAM)
Phish Alert Button (PAB)
CYBERSECURITY HYGIENE
Data Privacy
Information Security
Virus
SOCIAL ENGINEERING
Spoofing
MALWARE
USB
CYBERSECURITY AWARENESS MONTH
Public Wi-Fi
RANSOMWARE
Data Breach
BUSINESS EMAIL COMPROMISE (BEC)
PASSWORD SPRAYING
Social Media Scams
PolicyTech
ARTIFICIAL INTELLIGENCE
Internet of Things
PASSWORD STRENGTH METER
KNOWBE4
SMISHING
VISHING
PASSPHRASE
Encryption
SHARING SENSITIVE DATA
VPN (Virtual Private Network)
IDENTITY THEFT
Cloud Security
Hacker
SECURITY AWARENESS
ANNUAL SECURITY TRAINING
PHISHING
QR Code Scams