ScreenlockpolicyPhishingIntrusionWormZero-dayWhalephishingScarewareCompromiseEncryptionVulnerabilityPersonallyidentifiableinformation(PII)AwarenessRansomwareDarkwebMalwareVirusBreachSoftwareupdatesMulti-factorauthentication(MFA)CyberattackReusingpasswordsSpearphishingExploitBackupsTrainingScreenlockpolicyPhishingIntrusionWormZero-dayWhalephishingScarewareCompromiseEncryptionVulnerabilityPersonallyidentifiableinformation(PII)AwarenessRansomwareDarkwebMalwareVirusBreachSoftwareupdatesMulti-factorauthentication(MFA)CyberattackReusingpasswordsSpearphishingExploitBackupsTraining

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Screen lock policy
  2. Phishing
  3. Intrusion
  4. Worm
  5. Zero-day
  6. Whale phishing
  7. Scareware
  8. Compromise
  9. Encryption
  10. Vulnerability
  11. Personally identifiable information (PII)
  12. Awareness
  13. Ransomware
  14. Dark web
  15. Malware
  16. Virus
  17. Breach
  18. Software updates
  19. Multi-factor authentication (MFA)
  20. Cyberattack
  21. Reusing passwords
  22. Spear phishing
  23. Exploit
  24. Backups
  25. Training