Endpoint Ransomware Trojan Spoofing Intrusion Data Loss Prevention (DLP) Backups Botnet Encryption Virus Scareware Phishing Malware IPS (Intrusion Prevention System) Exploit Screen lock policy Worm Digital Certificate Threat Threat Intelligence Hashing Multi-factor authentication (MFA) Risk Assessment Training Personally identifiable information (PII) APT (Advanced Persistent Threat) Patch Insider Threat Zero- day IDS (Intrusion Detection System) Incident Response Social Engineering Software updates Sandbox Cyber Hygiene Cyberattack Vulnerability Breach Security Policy Whale phishing Threat Actor Honeypot Dark web Backdoor Reusing passwords Awareness Compliance Penetration Testing Spear phishing Compromise Endpoint Ransomware Trojan Spoofing Intrusion Data Loss Prevention (DLP) Backups Botnet Encryption Virus Scareware Phishing Malware IPS (Intrusion Prevention System) Exploit Screen lock policy Worm Digital Certificate Threat Threat Intelligence Hashing Multi-factor authentication (MFA) Risk Assessment Training Personally identifiable information (PII) APT (Advanced Persistent Threat) Patch Insider Threat Zero- day IDS (Intrusion Detection System) Incident Response Social Engineering Software updates Sandbox Cyber Hygiene Cyberattack Vulnerability Breach Security Policy Whale phishing Threat Actor Honeypot Dark web Backdoor Reusing passwords Awareness Compliance Penetration Testing Spear phishing Compromise
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Endpoint
Ransomware
Trojan
Spoofing
Intrusion
Data Loss Prevention (DLP)
Backups
Botnet
Encryption
Virus
Scareware
Phishing
Malware
IPS (Intrusion Prevention System)
Exploit
Screen lock policy
Worm
Digital Certificate
Threat
Threat Intelligence
Hashing
Multi-factor authentication (MFA)
Risk Assessment
Training
Personally identifiable information (PII)
APT (Advanced Persistent Threat)
Patch
Insider Threat
Zero-day
IDS (Intrusion Detection System)
Incident Response
Social Engineering
Software updates
Sandbox
Cyber Hygiene
Cyberattack
Vulnerability
Breach
Security Policy
Whale phishing
Threat Actor
Honeypot
Dark web
Backdoor
Reusing passwords
Awareness
Compliance
Penetration Testing
Spear phishing
Compromise