Mobile Application Management (MAM) Hacker VPN (Virtual Private Network) SMISHING SHARING SENSITIVE DATA MULTI-FACTOR AUTHENTICATION (MFA) USB CYBERSECURITY AWARENESS MONTH PASSWORD STRENGTH METER KNOWBE4 Internet of Things RANSOMWARE PHISHING SECURITY AWARENESS Phish Alert Button (PAB) Public Wi-Fi Cloud Security PolicyTech SOCIAL ENGINEERING MALWARE BUSINESS EMAIL COMPROMISE (BEC) Information Security IDENTITY THEFT Spoofing Social Media Scams Virus Trojan Horse CYBERSECURITY HYGIENE Data Breach PASSPHRASE Encryption VISHING QR Code Scams CHATGPT ANNUAL SECURITY TRAINING ARTIFICIAL INTELLIGENCE PASSWORD SPRAYING Data Privacy Mobile Application Management (MAM) Hacker VPN (Virtual Private Network) SMISHING SHARING SENSITIVE DATA MULTI-FACTOR AUTHENTICATION (MFA) USB CYBERSECURITY AWARENESS MONTH PASSWORD STRENGTH METER KNOWBE4 Internet of Things RANSOMWARE PHISHING SECURITY AWARENESS Phish Alert Button (PAB) Public Wi-Fi Cloud Security PolicyTech SOCIAL ENGINEERING MALWARE BUSINESS EMAIL COMPROMISE (BEC) Information Security IDENTITY THEFT Spoofing Social Media Scams Virus Trojan Horse CYBERSECURITY HYGIENE Data Breach PASSPHRASE Encryption VISHING QR Code Scams CHATGPT ANNUAL SECURITY TRAINING ARTIFICIAL INTELLIGENCE PASSWORD SPRAYING Data Privacy
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Mobile Application Management (MAM)
Hacker
VPN (Virtual Private Network)
SMISHING
SHARING SENSITIVE DATA
MULTI-FACTOR AUTHENTICATION (MFA)
USB
CYBERSECURITY AWARENESS MONTH
PASSWORD STRENGTH METER
KNOWBE4
Internet of Things
RANSOMWARE
PHISHING
SECURITY AWARENESS
Phish Alert Button (PAB)
Public Wi-Fi
Cloud Security
PolicyTech
SOCIAL ENGINEERING
MALWARE
BUSINESS EMAIL COMPROMISE (BEC)
Information Security
IDENTITY THEFT
Spoofing
Social Media Scams
Virus
Trojan Horse
CYBERSECURITY HYGIENE
Data Breach
PASSPHRASE
Encryption
VISHING
QR Code Scams
CHATGPT
ANNUAL SECURITY TRAINING
ARTIFICIAL INTELLIGENCE
PASSWORD SPRAYING
Data Privacy