SOCIAL ENGINEERING KNOWBE4 IDENTITY THEFT Social Media Scams Trojan Horse MULTI-FACTOR AUTHENTICATION (MFA) Spoofing CYBERSECURITY HYGIENE VPN (Virtual Private Network) SECURITY AWARENESS Encryption PASSPHRASE QR Code Scams Data Breach PHISHING Public Wi-Fi SHARING SENSITIVE DATA SMISHING PASSWORD STRENGTH METER Virus Hacker Data Privacy RANSOMWARE CYBERSECURITY AWARENESS MONTH ARTIFICIAL INTELLIGENCE Mobile Application Management (MAM) VISHING Internet of Things PolicyTech MALWARE USB Phish Alert Button (PAB) PASSWORD SPRAYING BUSINESS EMAIL COMPROMISE (BEC) Information Security Cloud Security ANNUAL SECURITY TRAINING CHATGPT SOCIAL ENGINEERING KNOWBE4 IDENTITY THEFT Social Media Scams Trojan Horse MULTI-FACTOR AUTHENTICATION (MFA) Spoofing CYBERSECURITY HYGIENE VPN (Virtual Private Network) SECURITY AWARENESS Encryption PASSPHRASE QR Code Scams Data Breach PHISHING Public Wi-Fi SHARING SENSITIVE DATA SMISHING PASSWORD STRENGTH METER Virus Hacker Data Privacy RANSOMWARE CYBERSECURITY AWARENESS MONTH ARTIFICIAL INTELLIGENCE Mobile Application Management (MAM) VISHING Internet of Things PolicyTech MALWARE USB Phish Alert Button (PAB) PASSWORD SPRAYING BUSINESS EMAIL COMPROMISE (BEC) Information Security Cloud Security ANNUAL SECURITY TRAINING CHATGPT
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
SOCIAL ENGINEERING
KNOWBE4
IDENTITY THEFT
Social Media Scams
Trojan Horse
MULTI-FACTOR AUTHENTICATION (MFA)
Spoofing
CYBERSECURITY HYGIENE
VPN (Virtual Private Network)
SECURITY AWARENESS
Encryption
PASSPHRASE
QR Code Scams
Data Breach
PHISHING
Public Wi-Fi
SHARING SENSITIVE DATA
SMISHING
PASSWORD STRENGTH METER
Virus
Hacker
Data Privacy
RANSOMWARE
CYBERSECURITY AWARENESS MONTH
ARTIFICIAL INTELLIGENCE
Mobile Application Management (MAM)
VISHING
Internet of Things
PolicyTech
MALWARE
USB
Phish Alert Button (PAB)
PASSWORD SPRAYING
BUSINESS EMAIL COMPROMISE (BEC)
Information Security
Cloud Security
ANNUAL SECURITY TRAINING
CHATGPT