PASSWORDSPRAYINGVirusSHARINGSENSITIVEDATASECURITYAWARENESSEncryptionQRCodeScamsPHISHINGVPN(VirtualPrivateNetwork)RANSOMWAREPublicWi-FiKNOWBE4HackerBUSINESSEMAILCOMPROMISE(BEC)TrojanHorseInformationSecurityCloudSecurityVISHINGCYBERSECURITYHYGIENESOCIALENGINEERINGMULTI-FACTORAUTHENTICATION(MFA)CHATGPTSocialMediaScamsMALWAREPhishAlertButton(PAB)DataPrivacyInternetofThingsSpoofingDataBreachANNUALSECURITYTRAININGPolicyTechPASSWORDSTRENGTHMETERSMISHINGUSBIDENTITYTHEFTCYBERSECURITYAWARENESSMONTHARTIFICIALINTELLIGENCEMobileApplicationManagement(MAM)PASSPHRASEPASSWORDSPRAYINGVirusSHARINGSENSITIVEDATASECURITYAWARENESSEncryptionQRCodeScamsPHISHINGVPN(VirtualPrivateNetwork)RANSOMWAREPublicWi-FiKNOWBE4HackerBUSINESSEMAILCOMPROMISE(BEC)TrojanHorseInformationSecurityCloudSecurityVISHINGCYBERSECURITYHYGIENESOCIALENGINEERINGMULTI-FACTORAUTHENTICATION(MFA)CHATGPTSocialMediaScamsMALWAREPhishAlertButton(PAB)DataPrivacyInternetofThingsSpoofingDataBreachANNUALSECURITYTRAININGPolicyTechPASSWORDSTRENGTHMETERSMISHINGUSBIDENTITYTHEFTCYBERSECURITYAWARENESSMONTHARTIFICIALINTELLIGENCEMobileApplicationManagement(MAM)PASSPHRASE

Cybersecurity BINGO! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. PASSWORD SPRAYING
  2. Virus
  3. SHARING SENSITIVE DATA
  4. SECURITY AWARENESS
  5. Encryption
  6. QR Code Scams
  7. PHISHING
  8. VPN (Virtual Private Network)
  9. RANSOMWARE
  10. Public Wi-Fi
  11. KNOWBE4
  12. Hacker
  13. BUSINESS EMAIL COMPROMISE (BEC)
  14. Trojan Horse
  15. Information Security
  16. Cloud Security
  17. VISHING
  18. CYBERSECURITY HYGIENE
  19. SOCIAL ENGINEERING
  20. MULTI-FACTOR AUTHENTICATION (MFA)
  21. CHATGPT
  22. Social Media Scams
  23. MALWARE
  24. Phish Alert Button (PAB)
  25. Data Privacy
  26. Internet of Things
  27. Spoofing
  28. Data Breach
  29. ANNUAL SECURITY TRAINING
  30. PolicyTech
  31. PASSWORD STRENGTH METER
  32. SMISHING
  33. USB
  34. IDENTITY THEFT
  35. CYBERSECURITY AWARENESS MONTH
  36. ARTIFICIAL INTELLIGENCE
  37. Mobile Application Management (MAM)
  38. PASSPHRASE