sand box Zero- day exploit Multi-factor authentication (MFA) Virus shadow IT Acceptable Use Policy BYOD (Bring Your Own Device) Digital footprint Incident response Business email compromise (BEC) Data breach Firewall Social engineering Role- based access control removable media attack vector confidential data Keeper Privilege escalation Restricted country Dark web spear phishing threat actor penetration testing Zero Trust Data classification Password manager Tailgating Cyber hygiene Phishing vishing Access control Phish Alert Button (PAB) Adware Brute force attack Compliance backdoor Policy Violation VPN (Virtual Private Network) Role- based training Patch update endpoint security Encryption DDoS attack (Distributed Denial of Service) smishing Tokenization Ransomware Keylogger Malware Insider threat Clean desk policy Annual security training Impersonation Spyware Misinformation (AI) Spoofed domain Deepfake Restricted data Remediation Training Security audit Vulnerability Public data Credential stuffing Incident Response Team Blocklisting Free! sand box Zero- day exploit Multi-factor authentication (MFA) Virus shadow IT Acceptable Use Policy BYOD (Bring Your Own Device) Digital footprint Incident response Business email compromise (BEC) Data breach Firewall Social engineering Role- based access control removable media attack vector confidential data Keeper Privilege escalation Restricted country Dark web spear phishing threat actor penetration testing Zero Trust Data classification Password manager Tailgating Cyber hygiene Phishing vishing Access control Phish Alert Button (PAB) Adware Brute force attack Compliance backdoor Policy Violation VPN (Virtual Private Network) Role- based training Patch update endpoint security Encryption DDoS attack (Distributed Denial of Service) smishing Tokenization Ransomware Keylogger Malware Insider threat Clean desk policy Annual security training Impersonation Spyware Misinformation (AI) Spoofed domain Deepfake Restricted data Remediation Training Security audit Vulnerability Public data Credential stuffing Incident Response Team Blocklisting Free!
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
sand box
Zero-day exploit
Multi-factor authentication (MFA)
Virus
shadow IT
Acceptable Use Policy
BYOD (Bring Your Own Device)
Digital footprint
Incident response
Business email compromise (BEC)
Data breach
Firewall
Social engineering
Role-based access control
removable media
attack vector
confidential data
Keeper
Privilege escalation
Restricted country
Dark web
spear phishing
threat actor
penetration testing
Zero Trust
Data classification
Password manager
Tailgating
Cyber hygiene
Phishing
vishing
Access control
Phish Alert Button (PAB)
Adware
Brute force attack
Compliance
backdoor
Policy Violation
VPN (Virtual Private Network)
Role-based training
Patch update
endpoint security
Encryption
DDoS attack (Distributed Denial of Service)
smishing
Tokenization
Ransomware
Keylogger
Malware
Insider threat
Clean desk policy
Annual security training
Impersonation
Spyware
Misinformation (AI)
Spoofed domain
Deepfake
Restricted data
Remediation Training
Security audit
Vulnerability
Public data
Credential stuffing
Incident Response Team
Blocklisting
Free!