Multi-factor authentication (MFA) shadow IT Malware Compliance BYOD (Bring Your Own Device) Access control spear phishing Phish Alert Button (PAB) Keylogger attack vector Zero Trust Phishing Ransomware Data classification Vulnerability Patch update Tailgating Dark web Firewall Role- based access control Cyber hygiene Policy Violation Digital footprint Incident response Keeper Restricted country endpoint security Clean desk policy Adware Annual security training Virus Role- based training vishing confidential data Incident Response Team Blocklisting Security audit Data breach Encryption Zero- day exploit Business email compromise (BEC) Credential stuffing Restricted data Free! Brute force attack Privilege escalation penetration testing threat actor Insider threat Social engineering Deepfake DDoS attack (Distributed Denial of Service) Remediation Training Password manager Misinformation (AI) Public data Spyware smishing backdoor removable media Tokenization Spoofed domain Impersonation Acceptable Use Policy sand box VPN (Virtual Private Network) Multi-factor authentication (MFA) shadow IT Malware Compliance BYOD (Bring Your Own Device) Access control spear phishing Phish Alert Button (PAB) Keylogger attack vector Zero Trust Phishing Ransomware Data classification Vulnerability Patch update Tailgating Dark web Firewall Role- based access control Cyber hygiene Policy Violation Digital footprint Incident response Keeper Restricted country endpoint security Clean desk policy Adware Annual security training Virus Role- based training vishing confidential data Incident Response Team Blocklisting Security audit Data breach Encryption Zero- day exploit Business email compromise (BEC) Credential stuffing Restricted data Free! Brute force attack Privilege escalation penetration testing threat actor Insider threat Social engineering Deepfake DDoS attack (Distributed Denial of Service) Remediation Training Password manager Misinformation (AI) Public data Spyware smishing backdoor removable media Tokenization Spoofed domain Impersonation Acceptable Use Policy sand box VPN (Virtual Private Network)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Multi-factor authentication (MFA)
shadow IT
Malware
Compliance
BYOD (Bring Your Own Device)
Access control
spear phishing
Phish Alert Button (PAB)
Keylogger
attack vector
Zero Trust
Phishing
Ransomware
Data classification
Vulnerability
Patch update
Tailgating
Dark web
Firewall
Role-based access control
Cyber hygiene
Policy Violation
Digital footprint
Incident response
Keeper
Restricted country
endpoint security
Clean desk policy
Adware
Annual security training
Virus
Role-based training
vishing
confidential data
Incident Response Team
Blocklisting
Security audit
Data breach
Encryption
Zero-day exploit
Business email compromise (BEC)
Credential stuffing
Restricted data
Free!
Brute force attack
Privilege escalation
penetration testing
threat actor
Insider threat
Social engineering
Deepfake
DDoS attack (Distributed Denial of Service)
Remediation Training
Password manager
Misinformation (AI)
Public data
Spyware
smishing
backdoor
removable media
Tokenization
Spoofed domain
Impersonation
Acceptable Use Policy
sand box
VPN (Virtual Private Network)