CYBERSECURITYAWARENESSMONTHCloudSecurityMULTI-FACTORAUTHENTICATION(MFA)DataPrivacyKNOWBE4PolicyTechMALWARESECURITYAWARENESSInformationSecurityMobileApplicationManagement(MAM)RANSOMWAREPASSWORDSPRAYINGPASSPHRASESpoofingVPN(VirtualPrivateNetwork)SOCIALENGINEERINGVirusANNUALSECURITYTRAININGHackerPhishAlertButton(PAB)VISHINGCHATGPTSHARINGSENSITIVEDATAUSBCYBERSECURITYHYGIENESMISHINGIDENTITYTHEFTDataBreachPASSWORDSTRENGTHMETERTrojanHorseBUSINESSEMAILCOMPROMISE(BEC)ARTIFICIALINTELLIGENCEInternetofThingsPHISHINGQRCodeScamsPublicWi-FiEncryptionSocialMediaScamsCYBERSECURITYAWARENESSMONTHCloudSecurityMULTI-FACTORAUTHENTICATION(MFA)DataPrivacyKNOWBE4PolicyTechMALWARESECURITYAWARENESSInformationSecurityMobileApplicationManagement(MAM)RANSOMWAREPASSWORDSPRAYINGPASSPHRASESpoofingVPN(VirtualPrivateNetwork)SOCIALENGINEERINGVirusANNUALSECURITYTRAININGHackerPhishAlertButton(PAB)VISHINGCHATGPTSHARINGSENSITIVEDATAUSBCYBERSECURITYHYGIENESMISHINGIDENTITYTHEFTDataBreachPASSWORDSTRENGTHMETERTrojanHorseBUSINESSEMAILCOMPROMISE(BEC)ARTIFICIALINTELLIGENCEInternetofThingsPHISHINGQRCodeScamsPublicWi-FiEncryptionSocialMediaScams

Cybersecurity Superhero BINGO! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. CYBERSECURITY AWARENESS MONTH
  2. Cloud Security
  3. MULTI-FACTOR AUTHENTICATION (MFA)
  4. Data Privacy
  5. KNOWBE4
  6. PolicyTech
  7. MALWARE
  8. SECURITY AWARENESS
  9. Information Security
  10. Mobile Application Management (MAM)
  11. RANSOMWARE
  12. PASSWORD SPRAYING
  13. PASSPHRASE
  14. Spoofing
  15. VPN (Virtual Private Network)
  16. SOCIAL ENGINEERING
  17. Virus
  18. ANNUAL SECURITY TRAINING
  19. Hacker
  20. Phish Alert Button (PAB)
  21. VISHING
  22. CHATGPT
  23. SHARING SENSITIVE DATA
  24. USB
  25. CYBERSECURITY HYGIENE
  26. SMISHING
  27. IDENTITY THEFT
  28. Data Breach
  29. PASSWORD STRENGTH METER
  30. Trojan Horse
  31. BUSINESS EMAIL COMPROMISE (BEC)
  32. ARTIFICIAL INTELLIGENCE
  33. Internet of Things
  34. PHISHING
  35. QR Code Scams
  36. Public Wi-Fi
  37. Encryption
  38. Social Media Scams