VISHINGBUSINESSEMAILCOMPROMISE(BEC)VPN(VirtualPrivateNetwork)IDENTITYTHEFTVirusInternetofThingsSOCIALENGINEERINGSocialMediaScamsKNOWBE4ARTIFICIALINTELLIGENCEMobileApplicationManagement(MAM)PASSWORDSPRAYINGDataPrivacyUSBSMISHINGPolicyTechEncryptionPublicWi-FiSHARINGSENSITIVEDATAPhishAlertButton(PAB)PHISHINGQRCodeScamsDataBreachCYBERSECURITYAWARENESSMONTHRANSOMWAREInformationSecuritySECURITYAWARENESSANNUALSECURITYTRAININGMALWARECHATGPTTrojanHorsePASSPHRASEPASSWORDSTRENGTHMETERCloudSecurityHackerCYBERSECURITYHYGIENESpoofingMULTI-FACTORAUTHENTICATION(MFA)VISHINGBUSINESSEMAILCOMPROMISE(BEC)VPN(VirtualPrivateNetwork)IDENTITYTHEFTVirusInternetofThingsSOCIALENGINEERINGSocialMediaScamsKNOWBE4ARTIFICIALINTELLIGENCEMobileApplicationManagement(MAM)PASSWORDSPRAYINGDataPrivacyUSBSMISHINGPolicyTechEncryptionPublicWi-FiSHARINGSENSITIVEDATAPhishAlertButton(PAB)PHISHINGQRCodeScamsDataBreachCYBERSECURITYAWARENESSMONTHRANSOMWAREInformationSecuritySECURITYAWARENESSANNUALSECURITYTRAININGMALWARECHATGPTTrojanHorsePASSPHRASEPASSWORDSTRENGTHMETERCloudSecurityHackerCYBERSECURITYHYGIENESpoofingMULTI-FACTORAUTHENTICATION(MFA)

Cybersecurity BINGO! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. VISHING
  2. BUSINESS EMAIL COMPROMISE (BEC)
  3. VPN (Virtual Private Network)
  4. IDENTITY THEFT
  5. Virus
  6. Internet of Things
  7. SOCIAL ENGINEERING
  8. Social Media Scams
  9. KNOWBE4
  10. ARTIFICIAL INTELLIGENCE
  11. Mobile Application Management (MAM)
  12. PASSWORD SPRAYING
  13. Data Privacy
  14. USB
  15. SMISHING
  16. PolicyTech
  17. Encryption
  18. Public Wi-Fi
  19. SHARING SENSITIVE DATA
  20. Phish Alert Button (PAB)
  21. PHISHING
  22. QR Code Scams
  23. Data Breach
  24. CYBERSECURITY AWARENESS MONTH
  25. RANSOMWARE
  26. Information Security
  27. SECURITY AWARENESS
  28. ANNUAL SECURITY TRAINING
  29. MALWARE
  30. CHATGPT
  31. Trojan Horse
  32. PASSPHRASE
  33. PASSWORD STRENGTH METER
  34. Cloud Security
  35. Hacker
  36. CYBERSECURITY HYGIENE
  37. Spoofing
  38. MULTI-FACTOR AUTHENTICATION (MFA)