Threat Backdoor Compromise Virus Whale phishing Endpoint Reusing passwords Vulnerability Worm Trojan APT (Advanced Persistent Threat) Threat Actor Intrusion Zero- day Botnet Software updates Cyber Hygiene Phishing Ransomware Security Policy Spoofing Threat Intelligence Backups Penetration Testing Encryption Exploit Cyberattack Compliance Screen lock policy Spear phishing Digital Certificate Data Loss Prevention (DLP) Honeypot Multi-factor authentication (MFA) Scareware Social Engineering Malware Incident Response Dark web Personally identifiable information (PII) Breach Training Patch Insider Threat Awareness Threat Backdoor Compromise Virus Whale phishing Endpoint Reusing passwords Vulnerability Worm Trojan APT (Advanced Persistent Threat) Threat Actor Intrusion Zero- day Botnet Software updates Cyber Hygiene Phishing Ransomware Security Policy Spoofing Threat Intelligence Backups Penetration Testing Encryption Exploit Cyberattack Compliance Screen lock policy Spear phishing Digital Certificate Data Loss Prevention (DLP) Honeypot Multi-factor authentication (MFA) Scareware Social Engineering Malware Incident Response Dark web Personally identifiable information (PII) Breach Training Patch Insider Threat Awareness
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Threat
Backdoor
Compromise
Virus
Whale phishing
Endpoint
Reusing passwords
Vulnerability
Worm
Trojan
APT (Advanced Persistent Threat)
Threat Actor
Intrusion
Zero-day
Botnet
Software updates
Cyber Hygiene
Phishing
Ransomware
Security Policy
Spoofing
Threat Intelligence
Backups
Penetration Testing
Encryption
Exploit
Cyberattack
Compliance
Screen lock policy
Spear phishing
Digital Certificate
Data Loss Prevention (DLP)
Honeypot
Multi-factor authentication (MFA)
Scareware
Social Engineering
Malware
Incident Response
Dark web
Personally identifiable information (PII)
Breach
Training
Patch
Insider Threat
Awareness