Breach Threat Backdoor Awareness Multi-factor authentication (MFA) Patch Training Security Policy Incident Response Screen lock policy Exploit Software updates Personally identifiable information (PII) Botnet Reusing passwords Compromise Digital Certificate Threat Actor Dark web Whale phishing Spear phishing APT (Advanced Persistent Threat) Intrusion Data Loss Prevention (DLP) Cyberattack Backups Phishing Cyber Hygiene Threat Intelligence Encryption Spoofing Penetration Testing Malware Insider Threat Social Engineering Virus Scareware Ransomware Zero- day Endpoint Trojan Honeypot Compliance Vulnerability Worm Breach Threat Backdoor Awareness Multi-factor authentication (MFA) Patch Training Security Policy Incident Response Screen lock policy Exploit Software updates Personally identifiable information (PII) Botnet Reusing passwords Compromise Digital Certificate Threat Actor Dark web Whale phishing Spear phishing APT (Advanced Persistent Threat) Intrusion Data Loss Prevention (DLP) Cyberattack Backups Phishing Cyber Hygiene Threat Intelligence Encryption Spoofing Penetration Testing Malware Insider Threat Social Engineering Virus Scareware Ransomware Zero- day Endpoint Trojan Honeypot Compliance Vulnerability Worm
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Breach
Threat
Backdoor
Awareness
Multi-factor authentication (MFA)
Patch
Training
Security Policy
Incident Response
Screen lock policy
Exploit
Software updates
Personally identifiable information (PII)
Botnet
Reusing passwords
Compromise
Digital Certificate
Threat Actor
Dark web
Whale phishing
Spear phishing
APT (Advanced Persistent Threat)
Intrusion
Data Loss Prevention (DLP)
Cyberattack
Backups
Phishing
Cyber Hygiene
Threat Intelligence
Encryption
Spoofing
Penetration Testing
Malware
Insider Threat
Social Engineering
Virus
Scareware
Ransomware
Zero-day
Endpoint
Trojan
Honeypot
Compliance
Vulnerability
Worm