Cyberattack Screen lock policy Cyber Hygiene Trojan Awareness Endpoint Ransomware Insider Threat Personally identifiable information (PII) Spoofing Penetration Testing Zero- day Worm Whale phishing Patch Exploit Multi-factor authentication (MFA) Dark web Phishing APT (Advanced Persistent Threat) Training Malware Compromise Virus Vulnerability Encryption Backdoor Breach Botnet Compliance Intrusion Security Policy Data Loss Prevention (DLP) Software updates Backups Spear phishing Threat Honeypot Digital Certificate Social Engineering Incident Response Scareware Reusing passwords Threat Actor Threat Intelligence Cyberattack Screen lock policy Cyber Hygiene Trojan Awareness Endpoint Ransomware Insider Threat Personally identifiable information (PII) Spoofing Penetration Testing Zero- day Worm Whale phishing Patch Exploit Multi-factor authentication (MFA) Dark web Phishing APT (Advanced Persistent Threat) Training Malware Compromise Virus Vulnerability Encryption Backdoor Breach Botnet Compliance Intrusion Security Policy Data Loss Prevention (DLP) Software updates Backups Spear phishing Threat Honeypot Digital Certificate Social Engineering Incident Response Scareware Reusing passwords Threat Actor Threat Intelligence
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cyberattack
Screen lock policy
Cyber Hygiene
Trojan
Awareness
Endpoint
Ransomware
Insider Threat
Personally identifiable information (PII)
Spoofing
Penetration Testing
Zero-day
Worm
Whale phishing
Patch
Exploit
Multi-factor authentication (MFA)
Dark web
Phishing
APT (Advanced Persistent Threat)
Training
Malware
Compromise
Virus
Vulnerability
Encryption
Backdoor
Breach
Botnet
Compliance
Intrusion
Security Policy
Data Loss Prevention (DLP)
Software updates
Backups
Spear phishing
Threat
Honeypot
Digital Certificate
Social Engineering
Incident Response
Scareware
Reusing passwords
Threat Actor
Threat Intelligence