Whale phishing Backdoor Insider Threat Multi-factor authentication (MFA) Cyber Hygiene Endpoint IPS (Intrusion Prevention System) Malware Threat Intelligence Software updates Exploit Cyberattack Incident Response Spoofing Sandbox Training Data Loss Prevention (DLP) Ransomware Zero- day Intrusion Digital Certificate Dark web Penetration Testing Threat Actor Patch Firewall Honeypot Botnet Trojan Encryption IDS (Intrusion Detection System) Social Engineering Scareware Compliance DDoS (Distributed Denial of Service) Backups Spear phishing Reusing passwords Vulnerability Virus Compromise Worm Breach Phishing Personally identifiable information (PII) Security Policy Threat Awareness APT (Advanced Persistent Threat) Screen lock policy Whale phishing Backdoor Insider Threat Multi-factor authentication (MFA) Cyber Hygiene Endpoint IPS (Intrusion Prevention System) Malware Threat Intelligence Software updates Exploit Cyberattack Incident Response Spoofing Sandbox Training Data Loss Prevention (DLP) Ransomware Zero- day Intrusion Digital Certificate Dark web Penetration Testing Threat Actor Patch Firewall Honeypot Botnet Trojan Encryption IDS (Intrusion Detection System) Social Engineering Scareware Compliance DDoS (Distributed Denial of Service) Backups Spear phishing Reusing passwords Vulnerability Virus Compromise Worm Breach Phishing Personally identifiable information (PII) Security Policy Threat Awareness APT (Advanced Persistent Threat) Screen lock policy
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Whale phishing
Backdoor
Insider Threat
Multi-factor authentication (MFA)
Cyber Hygiene
Endpoint
IPS (Intrusion Prevention System)
Malware
Threat Intelligence
Software updates
Exploit
Cyberattack
Incident Response
Spoofing
Sandbox
Training
Data Loss Prevention (DLP)
Ransomware
Zero-day
Intrusion
Digital Certificate
Dark web
Penetration Testing
Threat Actor
Patch
Firewall
Honeypot
Botnet
Trojan
Encryption
IDS (Intrusion Detection System)
Social Engineering
Scareware
Compliance
DDoS (Distributed Denial of Service)
Backups
Spear phishing
Reusing passwords
Vulnerability
Virus
Compromise
Worm
Breach
Phishing
Personally identifiable information (PII)
Security Policy
Threat
Awareness
APT (Advanced Persistent Threat)
Screen lock policy