Zero-dayWhalephishingIntrusionVulnerabilityWormScarewareTrainingBackupsPhishingMalwareSpearphishingAwarenessExploitPersonallyidentifiableinformation(PII)CompromiseBreachScreenlockpolicyDarkwebReusingpasswordsSoftwareupdatesCyberattackVirusEncryptionMulti-factorauthentication(MFA)RansomwareZero-dayWhalephishingIntrusionVulnerabilityWormScarewareTrainingBackupsPhishingMalwareSpearphishingAwarenessExploitPersonallyidentifiableinformation(PII)CompromiseBreachScreenlockpolicyDarkwebReusingpasswordsSoftwareupdatesCyberattackVirusEncryptionMulti-factorauthentication(MFA)Ransomware

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Zero-day
  2. Whale phishing
  3. Intrusion
  4. Vulnerability
  5. Worm
  6. Scareware
  7. Training
  8. Backups
  9. Phishing
  10. Malware
  11. Spear phishing
  12. Awareness
  13. Exploit
  14. Personally identifiable information (PII)
  15. Compromise
  16. Breach
  17. Screen lock policy
  18. Dark web
  19. Reusing passwords
  20. Software updates
  21. Cyberattack
  22. Virus
  23. Encryption
  24. Multi-factor authentication (MFA)
  25. Ransomware