PHISHINGPASSWORDSTRENGTHMETERSHARINGSENSITIVEDATASpoofingUSBKNOWBE4MULTI-FACTORAUTHENTICATION(MFA)DataBreachVPN(VirtualPrivateNetwork)DataPrivacyARTIFICIALINTELLIGENCECloudSecurityVISHINGPublicWi-FiMALWARESMISHINGSocialMediaScamsCYBERSECURITYHYGIENEInternetofThingsMobileApplicationManagement(MAM)QRCodeScamsInformationSecurityPolicyTechBUSINESSEMAILCOMPROMISE(BEC)SECURITYAWARENESSTrojanHorseIDENTITYTHEFTHackerEncryptionPASSPHRASEANNUALSECURITYTRAININGVirusRANSOMWAREPASSWORDSPRAYINGSOCIALENGINEERINGPhishAlertButton(PAB)CHATGPTCYBERSECURITYAWARENESSMONTHPHISHINGPASSWORDSTRENGTHMETERSHARINGSENSITIVEDATASpoofingUSBKNOWBE4MULTI-FACTORAUTHENTICATION(MFA)DataBreachVPN(VirtualPrivateNetwork)DataPrivacyARTIFICIALINTELLIGENCECloudSecurityVISHINGPublicWi-FiMALWARESMISHINGSocialMediaScamsCYBERSECURITYHYGIENEInternetofThingsMobileApplicationManagement(MAM)QRCodeScamsInformationSecurityPolicyTechBUSINESSEMAILCOMPROMISE(BEC)SECURITYAWARENESSTrojanHorseIDENTITYTHEFTHackerEncryptionPASSPHRASEANNUALSECURITYTRAININGVirusRANSOMWAREPASSWORDSPRAYINGSOCIALENGINEERINGPhishAlertButton(PAB)CHATGPTCYBERSECURITYAWARENESSMONTH

Cybersecurity BINGO! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. PHISHING
  2. PASSWORD STRENGTH METER
  3. SHARING SENSITIVE DATA
  4. Spoofing
  5. USB
  6. KNOWBE4
  7. MULTI-FACTOR AUTHENTICATION (MFA)
  8. Data Breach
  9. VPN (Virtual Private Network)
  10. Data Privacy
  11. ARTIFICIAL INTELLIGENCE
  12. Cloud Security
  13. VISHING
  14. Public Wi-Fi
  15. MALWARE
  16. SMISHING
  17. Social Media Scams
  18. CYBERSECURITY HYGIENE
  19. Internet of Things
  20. Mobile Application Management (MAM)
  21. QR Code Scams
  22. Information Security
  23. PolicyTech
  24. BUSINESS EMAIL COMPROMISE (BEC)
  25. SECURITY AWARENESS
  26. Trojan Horse
  27. IDENTITY THEFT
  28. Hacker
  29. Encryption
  30. PASSPHRASE
  31. ANNUAL SECURITY TRAINING
  32. Virus
  33. RANSOMWARE
  34. PASSWORD SPRAYING
  35. SOCIAL ENGINEERING
  36. Phish Alert Button (PAB)
  37. CHATGPT
  38. CYBERSECURITY AWARENESS MONTH