2FA MFA Data Privacy Zero- day exploit Cybersecurity insurance Exploit Ransomware Man-in- the- middle attack Phishing Security breach Digital Certificate Crowdstrike Rootkit Cybersecurity awareness Incident response Trojan Spam Denial of Service (DOS) Identity theft Encryption Vulnerability Backdoor Security posture PII IT Security Program Firewall Hacker Password Virus VPN Network monitoring Cyberbullying Keylogger Penetration testing Cyber intelligence Patch 2FA MFA Data Privacy Zero- day exploit Cybersecurity insurance Exploit Ransomware Man-in- the- middle attack Phishing Security breach Digital Certificate Crowdstrike Rootkit Cybersecurity awareness Incident response Trojan Spam Denial of Service (DOS) Identity theft Encryption Vulnerability Backdoor Security posture PII IT Security Program Firewall Hacker Password Virus VPN Network monitoring Cyberbullying Keylogger Penetration testing Cyber intelligence Patch
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
2FA
MFA
Data Privacy
Zero-day exploit
Cybersecurity insurance
Exploit
Ransomware
Man-in-the-middle attack
Phishing
Security breach
Digital Certificate
Crowdstrike
Rootkit
Cybersecurity awareness
Incident response
Trojan
Spam
Denial of Service (DOS)
Identity theft
Encryption
Vulnerability
Backdoor
Security posture
PII
IT Security Program
Firewall
Hacker
Password
Virus
VPN
Network monitoring
Cyberbullying
Keylogger
Penetration testing
Cyber intelligence
Patch