Dark web Compromise Botnet Patch Whale phishing Backdoor Threat Actor Virus Phishing Breach Incident Response Ransomware APT (Advanced Persistent Threat) Personally identifiable information (PII) Scareware Threat Intelligence Awareness Penetration Testing Digital Certificate Social Engineering Worm Intrusion Zero- day Software updates Exploit Screen lock policy Honeypot Backups Malware Encryption Vulnerability Multi-factor authentication (MFA) Training Threat Cyber Hygiene Data Loss Prevention (DLP) Spear phishing Insider Threat Compliance Spoofing Endpoint Reusing passwords Trojan Security Policy Cyberattack Dark web Compromise Botnet Patch Whale phishing Backdoor Threat Actor Virus Phishing Breach Incident Response Ransomware APT (Advanced Persistent Threat) Personally identifiable information (PII) Scareware Threat Intelligence Awareness Penetration Testing Digital Certificate Social Engineering Worm Intrusion Zero- day Software updates Exploit Screen lock policy Honeypot Backups Malware Encryption Vulnerability Multi-factor authentication (MFA) Training Threat Cyber Hygiene Data Loss Prevention (DLP) Spear phishing Insider Threat Compliance Spoofing Endpoint Reusing passwords Trojan Security Policy Cyberattack
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Dark web
Compromise
Botnet
Patch
Whale phishing
Backdoor
Threat Actor
Virus
Phishing
Breach
Incident Response
Ransomware
APT (Advanced Persistent Threat)
Personally identifiable information (PII)
Scareware
Threat Intelligence
Awareness
Penetration Testing
Digital Certificate
Social Engineering
Worm
Intrusion
Zero-day
Software updates
Exploit
Screen lock policy
Honeypot
Backups
Malware
Encryption
Vulnerability
Multi-factor authentication (MFA)
Training
Threat
Cyber Hygiene
Data Loss Prevention (DLP)
Spear phishing
Insider Threat
Compliance
Spoofing
Endpoint
Reusing passwords
Trojan
Security Policy
Cyberattack