Breach Worm Digital Certificate Scareware Spear phishing Honeypot Reusing passwords Whale phishing Compliance Intrusion Awareness Zero- day Cyberattack Virus Data Loss Prevention (DLP) Cyber Hygiene Threat Trojan Patch Software updates Security Policy Insider Threat APT (Advanced Persistent Threat) Screen lock policy Backdoor Encryption Ransomware Endpoint Threat Intelligence Exploit Penetration Testing Personally identifiable information (PII) Training Spoofing Dark web Phishing Malware Vulnerability Multi-factor authentication (MFA) Threat Actor Compromise Backups Botnet Incident Response Social Engineering Breach Worm Digital Certificate Scareware Spear phishing Honeypot Reusing passwords Whale phishing Compliance Intrusion Awareness Zero- day Cyberattack Virus Data Loss Prevention (DLP) Cyber Hygiene Threat Trojan Patch Software updates Security Policy Insider Threat APT (Advanced Persistent Threat) Screen lock policy Backdoor Encryption Ransomware Endpoint Threat Intelligence Exploit Penetration Testing Personally identifiable information (PII) Training Spoofing Dark web Phishing Malware Vulnerability Multi-factor authentication (MFA) Threat Actor Compromise Backups Botnet Incident Response Social Engineering
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Breach
Worm
Digital Certificate
Scareware
Spear phishing
Honeypot
Reusing passwords
Whale phishing
Compliance
Intrusion
Awareness
Zero-day
Cyberattack
Virus
Data Loss Prevention (DLP)
Cyber Hygiene
Threat
Trojan
Patch
Software updates
Security Policy
Insider Threat
APT (Advanced Persistent Threat)
Screen lock policy
Backdoor
Encryption
Ransomware
Endpoint
Threat Intelligence
Exploit
Penetration Testing
Personally identifiable information (PII)
Training
Spoofing
Dark web
Phishing
Malware
Vulnerability
Multi-factor authentication (MFA)
Threat Actor
Compromise
Backups
Botnet
Incident Response
Social Engineering