Phishing Virus Keylogger Crowdstrike Ransomware Patch Password Data Privacy IT Security Program Cyber intelligence Encryption 2FA MFA Man-in- the- middle attack Vulnerability Security posture Network monitoring VPN PII Digital Certificate Denial of Service (DOS) Hacker Exploit Rootkit Cybersecurity awareness Incident response Cybersecurity insurance Cyberbullying Zero- day exploit Security breach Spam Identity theft Firewall Backdoor Penetration testing Trojan Phishing Virus Keylogger Crowdstrike Ransomware Patch Password Data Privacy IT Security Program Cyber intelligence Encryption 2FA MFA Man-in- the- middle attack Vulnerability Security posture Network monitoring VPN PII Digital Certificate Denial of Service (DOS) Hacker Exploit Rootkit Cybersecurity awareness Incident response Cybersecurity insurance Cyberbullying Zero- day exploit Security breach Spam Identity theft Firewall Backdoor Penetration testing Trojan
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Phishing
Virus
Keylogger
Crowdstrike
Ransomware
Patch
Password
Data Privacy
IT Security Program
Cyber intelligence
Encryption
2FA
MFA
Man-in-the-middle attack
Vulnerability
Security posture
Network monitoring
VPN
PII
Digital Certificate
Denial of Service (DOS)
Hacker
Exploit
Rootkit
Cybersecurity awareness
Incident response
Cybersecurity insurance
Cyberbullying
Zero-day exploit
Security breach
Spam
Identity theft
Firewall
Backdoor
Penetration testing
Trojan