Screen lock policy Compliance Spoofing Sandbox Ransomware Intrusion Risk Assessment Backdoor Multi-factor authentication (MFA) Endpoint IPS (Intrusion Prevention System) Training Whale phishing Threat Trojan Virus Patch Malware Backups Data Loss Prevention (DLP) Vulnerability Encryption Spear phishing Digital Certificate Exploit Threat Intelligence Compromise Phishing Scareware Security Policy Honeypot Breach Software updates APT (Advanced Persistent Threat) Social Engineering Awareness Zero- day Worm Cyber Hygiene Incident Response Penetration Testing Personally identifiable information (PII) IDS (Intrusion Detection System) Threat Actor Hashing Dark web Botnet Reusing passwords Insider Threat Cyberattack Screen lock policy Compliance Spoofing Sandbox Ransomware Intrusion Risk Assessment Backdoor Multi-factor authentication (MFA) Endpoint IPS (Intrusion Prevention System) Training Whale phishing Threat Trojan Virus Patch Malware Backups Data Loss Prevention (DLP) Vulnerability Encryption Spear phishing Digital Certificate Exploit Threat Intelligence Compromise Phishing Scareware Security Policy Honeypot Breach Software updates APT (Advanced Persistent Threat) Social Engineering Awareness Zero- day Worm Cyber Hygiene Incident Response Penetration Testing Personally identifiable information (PII) IDS (Intrusion Detection System) Threat Actor Hashing Dark web Botnet Reusing passwords Insider Threat Cyberattack
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Screen lock policy
Compliance
Spoofing
Sandbox
Ransomware
Intrusion
Risk Assessment
Backdoor
Multi-factor authentication (MFA)
Endpoint
IPS (Intrusion Prevention System)
Training
Whale phishing
Threat
Trojan
Virus
Patch
Malware
Backups
Data Loss Prevention (DLP)
Vulnerability
Encryption
Spear phishing
Digital Certificate
Exploit
Threat Intelligence
Compromise
Phishing
Scareware
Security Policy
Honeypot
Breach
Software updates
APT (Advanced Persistent Threat)
Social Engineering
Awareness
Zero-day
Worm
Cyber Hygiene
Incident Response
Penetration Testing
Personally identifiable information (PII)
IDS (Intrusion Detection System)
Threat Actor
Hashing
Dark web
Botnet
Reusing passwords
Insider Threat
Cyberattack