PhishAlertButton(PAB)IDENTITYTHEFTSHARINGSENSITIVEDATAVPN(VirtualPrivateNetwork)CloudSecurityBUSINESSEMAILCOMPROMISE(BEC)InformationSecuritySMISHINGSECURITYAWARENESSMobileApplicationManagement(MAM)PublicWi-FiHackerVISHINGCYBERSECURITYHYGIENESpoofingCHATGPTDataPrivacySOCIALENGINEERINGPASSWORDSPRAYINGARTIFICIALINTELLIGENCECYBERSECURITYAWARENESSMONTHTrojanHorseQRCodeScamsDataBreachPHISHINGMALWARESocialMediaScamsRANSOMWAREPASSWORDSTRENGTHMETERUSBMULTI-FACTORAUTHENTICATION(MFA)PASSPHRASEANNUALSECURITYTRAININGInternetofThingsEncryptionPolicyTechVirusKNOWBE4PhishAlertButton(PAB)IDENTITYTHEFTSHARINGSENSITIVEDATAVPN(VirtualPrivateNetwork)CloudSecurityBUSINESSEMAILCOMPROMISE(BEC)InformationSecuritySMISHINGSECURITYAWARENESSMobileApplicationManagement(MAM)PublicWi-FiHackerVISHINGCYBERSECURITYHYGIENESpoofingCHATGPTDataPrivacySOCIALENGINEERINGPASSWORDSPRAYINGARTIFICIALINTELLIGENCECYBERSECURITYAWARENESSMONTHTrojanHorseQRCodeScamsDataBreachPHISHINGMALWARESocialMediaScamsRANSOMWAREPASSWORDSTRENGTHMETERUSBMULTI-FACTORAUTHENTICATION(MFA)PASSPHRASEANNUALSECURITYTRAININGInternetofThingsEncryptionPolicyTechVirusKNOWBE4

Cybersecurity BINGO! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. Phish Alert Button (PAB)
  2. IDENTITY THEFT
  3. SHARING SENSITIVE DATA
  4. VPN (Virtual Private Network)
  5. Cloud Security
  6. BUSINESS EMAIL COMPROMISE (BEC)
  7. Information Security
  8. SMISHING
  9. SECURITY AWARENESS
  10. Mobile Application Management (MAM)
  11. Public Wi-Fi
  12. Hacker
  13. VISHING
  14. CYBERSECURITY HYGIENE
  15. Spoofing
  16. CHATGPT
  17. Data Privacy
  18. SOCIAL ENGINEERING
  19. PASSWORD SPRAYING
  20. ARTIFICIAL INTELLIGENCE
  21. CYBERSECURITY AWARENESS MONTH
  22. Trojan Horse
  23. QR Code Scams
  24. Data Breach
  25. PHISHING
  26. MALWARE
  27. Social Media Scams
  28. RANSOMWARE
  29. PASSWORD STRENGTH METER
  30. USB
  31. MULTI-FACTOR AUTHENTICATION (MFA)
  32. PASSPHRASE
  33. ANNUAL SECURITY TRAINING
  34. Internet of Things
  35. Encryption
  36. PolicyTech
  37. Virus
  38. KNOWBE4