Software updates Malware Cyberattack Phishing Data Loss Prevention (DLP) Zero- day Botnet Worm Screen lock policy Whale phishing Patch Penetration Testing Breach Awareness Compliance Backdoor Personally identifiable information (PII) Threat Intelligence Backups Scareware Virus Spear phishing Honeypot Intrusion Compromise Multi-factor authentication (MFA) Insider Threat Incident Response Encryption APT (Advanced Persistent Threat) Reusing passwords Threat Actor Digital Certificate Social Engineering Vulnerability Trojan Threat Spoofing Dark web Cyber Hygiene Ransomware Endpoint Training Exploit Security Policy Software updates Malware Cyberattack Phishing Data Loss Prevention (DLP) Zero- day Botnet Worm Screen lock policy Whale phishing Patch Penetration Testing Breach Awareness Compliance Backdoor Personally identifiable information (PII) Threat Intelligence Backups Scareware Virus Spear phishing Honeypot Intrusion Compromise Multi-factor authentication (MFA) Insider Threat Incident Response Encryption APT (Advanced Persistent Threat) Reusing passwords Threat Actor Digital Certificate Social Engineering Vulnerability Trojan Threat Spoofing Dark web Cyber Hygiene Ransomware Endpoint Training Exploit Security Policy
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Software updates
Malware
Cyberattack
Phishing
Data Loss Prevention (DLP)
Zero-day
Botnet
Worm
Screen lock policy
Whale phishing
Patch
Penetration Testing
Breach
Awareness
Compliance
Backdoor
Personally identifiable information (PII)
Threat Intelligence
Backups
Scareware
Virus
Spear phishing
Honeypot
Intrusion
Compromise
Multi-factor authentication (MFA)
Insider Threat
Incident Response
Encryption
APT (Advanced Persistent Threat)
Reusing passwords
Threat Actor
Digital Certificate
Social Engineering
Vulnerability
Trojan
Threat
Spoofing
Dark web
Cyber Hygiene
Ransomware
Endpoint
Training
Exploit
Security Policy