WhalephishingIntrusionBreachZero-dayReusingpasswordsPersonallyidentifiableinformation(PII)ScreenlockpolicyCyberattackMulti-factorauthentication(MFA)SpearphishingVirusTrainingMalwareBackupsRansomwarePhishingSoftwareupdatesVulnerabilityDarkwebEncryptionWormScarewareExploitAwarenessCompromiseWhalephishingIntrusionBreachZero-dayReusingpasswordsPersonallyidentifiableinformation(PII)ScreenlockpolicyCyberattackMulti-factorauthentication(MFA)SpearphishingVirusTrainingMalwareBackupsRansomwarePhishingSoftwareupdatesVulnerabilityDarkwebEncryptionWormScarewareExploitAwarenessCompromise

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Whale phishing
  2. Intrusion
  3. Breach
  4. Zero-day
  5. Reusing passwords
  6. Personally identifiable information (PII)
  7. Screen lock policy
  8. Cyberattack
  9. Multi-factor authentication (MFA)
  10. Spear phishing
  11. Virus
  12. Training
  13. Malware
  14. Backups
  15. Ransomware
  16. Phishing
  17. Software updates
  18. Vulnerability
  19. Dark web
  20. Encryption
  21. Worm
  22. Scareware
  23. Exploit
  24. Awareness
  25. Compromise