SOCIALENGINEERINGKNOWBE4IDENTITYTHEFTSocialMediaScamsTrojanHorseMULTI-FACTORAUTHENTICATION(MFA)SpoofingCYBERSECURITYHYGIENEVPN(VirtualPrivateNetwork)SECURITYAWARENESSEncryptionPASSPHRASEQRCodeScamsDataBreachPHISHINGPublicWi-FiSHARINGSENSITIVEDATASMISHINGPASSWORDSTRENGTHMETERVirusHackerDataPrivacyRANSOMWARECYBERSECURITYAWARENESSMONTHARTIFICIALINTELLIGENCEMobileApplicationManagement(MAM)VISHINGInternetofThingsPolicyTechMALWAREUSBPhishAlertButton(PAB)PASSWORDSPRAYINGBUSINESSEMAILCOMPROMISE(BEC)InformationSecurityCloudSecurityANNUALSECURITYTRAININGCHATGPTSOCIALENGINEERINGKNOWBE4IDENTITYTHEFTSocialMediaScamsTrojanHorseMULTI-FACTORAUTHENTICATION(MFA)SpoofingCYBERSECURITYHYGIENEVPN(VirtualPrivateNetwork)SECURITYAWARENESSEncryptionPASSPHRASEQRCodeScamsDataBreachPHISHINGPublicWi-FiSHARINGSENSITIVEDATASMISHINGPASSWORDSTRENGTHMETERVirusHackerDataPrivacyRANSOMWARECYBERSECURITYAWARENESSMONTHARTIFICIALINTELLIGENCEMobileApplicationManagement(MAM)VISHINGInternetofThingsPolicyTechMALWAREUSBPhishAlertButton(PAB)PASSWORDSPRAYINGBUSINESSEMAILCOMPROMISE(BEC)InformationSecurityCloudSecurityANNUALSECURITYTRAININGCHATGPT

Cybersecurity BINGO! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. SOCIAL ENGINEERING
  2. KNOWBE4
  3. IDENTITY THEFT
  4. Social Media Scams
  5. Trojan Horse
  6. MULTI-FACTOR AUTHENTICATION (MFA)
  7. Spoofing
  8. CYBERSECURITY HYGIENE
  9. VPN (Virtual Private Network)
  10. SECURITY AWARENESS
  11. Encryption
  12. PASSPHRASE
  13. QR Code Scams
  14. Data Breach
  15. PHISHING
  16. Public Wi-Fi
  17. SHARING SENSITIVE DATA
  18. SMISHING
  19. PASSWORD STRENGTH METER
  20. Virus
  21. Hacker
  22. Data Privacy
  23. RANSOMWARE
  24. CYBERSECURITY AWARENESS MONTH
  25. ARTIFICIAL INTELLIGENCE
  26. Mobile Application Management (MAM)
  27. VISHING
  28. Internet of Things
  29. PolicyTech
  30. MALWARE
  31. USB
  32. Phish Alert Button (PAB)
  33. PASSWORD SPRAYING
  34. BUSINESS EMAIL COMPROMISE (BEC)
  35. Information Security
  36. Cloud Security
  37. ANNUAL SECURITY TRAINING
  38. CHATGPT