Phish Alert Button (PAB) shadow IT Encryption VPN (Virtual Private Network) spear phishing Digital footprint Virus Spyware Brute force attack smishing Cyber hygiene Misinformation (AI) Clean desk policy Insider threat Patch update vishing Incident response Tailgating Restricted data Annual security training Social engineering Credential stuffing Keeper Vulnerability endpoint security Multi-factor authentication (MFA) Ransomware Zero- day exploit Role- based training Blocklisting Incident Response Team Malware Firewall Impersonation Deepfake Free! Acceptable Use Policy BYOD (Bring Your Own Device) Zero Trust Spoofed domain backdoor Data breach Public data Access control Role- based access control Security audit Phishing attack vector Keylogger threat actor confidential data Password manager Dark web Restricted country Data classification penetration testing Compliance removable media Remediation Training DDoS attack (Distributed Denial of Service) sand box Business email compromise (BEC) Privilege escalation Adware Policy Violation Tokenization Phish Alert Button (PAB) shadow IT Encryption VPN (Virtual Private Network) spear phishing Digital footprint Virus Spyware Brute force attack smishing Cyber hygiene Misinformation (AI) Clean desk policy Insider threat Patch update vishing Incident response Tailgating Restricted data Annual security training Social engineering Credential stuffing Keeper Vulnerability endpoint security Multi-factor authentication (MFA) Ransomware Zero- day exploit Role- based training Blocklisting Incident Response Team Malware Firewall Impersonation Deepfake Free! Acceptable Use Policy BYOD (Bring Your Own Device) Zero Trust Spoofed domain backdoor Data breach Public data Access control Role- based access control Security audit Phishing attack vector Keylogger threat actor confidential data Password manager Dark web Restricted country Data classification penetration testing Compliance removable media Remediation Training DDoS attack (Distributed Denial of Service) sand box Business email compromise (BEC) Privilege escalation Adware Policy Violation Tokenization
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Phish Alert Button (PAB)
shadow IT
Encryption
VPN (Virtual Private Network)
spear phishing
Digital footprint
Virus
Spyware
Brute force attack
smishing
Cyber hygiene
Misinformation (AI)
Clean desk policy
Insider threat
Patch update
vishing
Incident response
Tailgating
Restricted data
Annual security training
Social engineering
Credential stuffing
Keeper
Vulnerability
endpoint security
Multi-factor authentication (MFA)
Ransomware
Zero-day exploit
Role-based training
Blocklisting
Incident Response Team
Malware
Firewall
Impersonation
Deepfake
Free!
Acceptable Use Policy
BYOD (Bring Your Own Device)
Zero Trust
Spoofed domain
backdoor
Data breach
Public data
Access control
Role-based access control
Security audit
Phishing
attack vector
Keylogger
threat actor
confidential data
Password manager
Dark web
Restricted country
Data classification
penetration testing
Compliance
removable media
Remediation Training
DDoS attack (Distributed Denial of Service)
sand box
Business email compromise (BEC)
Privilege escalation
Adware
Policy Violation
Tokenization