Screen lock policy Encryption Backdoor Software updates Spear phishing Virus Honeypot Penetration Testing Digital Certificate APT (Advanced Persistent Threat) Vulnerability Reusing passwords Scareware Social Engineering Phishing Whale phishing Cyber Hygiene Ransomware Personally identifiable information (PII) Dark web Threat Intelligence Endpoint Spoofing Backups Awareness Security Policy Insider Threat Breach Training Incident Response Threat Compliance Threat Actor Compromise Zero- day Multi-factor authentication (MFA) Worm Intrusion Botnet Patch Trojan Data Loss Prevention (DLP) Malware Exploit Cyberattack Screen lock policy Encryption Backdoor Software updates Spear phishing Virus Honeypot Penetration Testing Digital Certificate APT (Advanced Persistent Threat) Vulnerability Reusing passwords Scareware Social Engineering Phishing Whale phishing Cyber Hygiene Ransomware Personally identifiable information (PII) Dark web Threat Intelligence Endpoint Spoofing Backups Awareness Security Policy Insider Threat Breach Training Incident Response Threat Compliance Threat Actor Compromise Zero- day Multi-factor authentication (MFA) Worm Intrusion Botnet Patch Trojan Data Loss Prevention (DLP) Malware Exploit Cyberattack
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Screen lock policy
Encryption
Backdoor
Software updates
Spear phishing
Virus
Honeypot
Penetration Testing
Digital Certificate
APT (Advanced Persistent Threat)
Vulnerability
Reusing passwords
Scareware
Social Engineering
Phishing
Whale phishing
Cyber Hygiene
Ransomware
Personally identifiable information (PII)
Dark web
Threat Intelligence
Endpoint
Spoofing
Backups
Awareness
Security Policy
Insider Threat
Breach
Training
Incident Response
Threat
Compliance
Threat Actor
Compromise
Zero-day
Multi-factor authentication (MFA)
Worm
Intrusion
Botnet
Patch
Trojan
Data Loss Prevention (DLP)
Malware
Exploit
Cyberattack