RansomwareScarewareEncryptionZero-dayPersonallyidentifiableinformation(PII)PhishingVirusAwarenessCyberattackSpearphishingVulnerabilityIntrusionScreenlockpolicyDarkwebCompromiseTrainingBreachExploitBackupsReusingpasswordsWhalephishingSoftwareupdatesWormMalwareMulti-factorauthentication(MFA)RansomwareScarewareEncryptionZero-dayPersonallyidentifiableinformation(PII)PhishingVirusAwarenessCyberattackSpearphishingVulnerabilityIntrusionScreenlockpolicyDarkwebCompromiseTrainingBreachExploitBackupsReusingpasswordsWhalephishingSoftwareupdatesWormMalwareMulti-factorauthentication(MFA)

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Ransomware
  2. Scareware
  3. Encryption
  4. Zero-day
  5. Personally identifiable information (PII)
  6. Phishing
  7. Virus
  8. Awareness
  9. Cyberattack
  10. Spear phishing
  11. Vulnerability
  12. Intrusion
  13. Screen lock policy
  14. Dark web
  15. Compromise
  16. Training
  17. Breach
  18. Exploit
  19. Backups
  20. Reusing passwords
  21. Whale phishing
  22. Software updates
  23. Worm
  24. Malware
  25. Multi-factor authentication (MFA)