CloudSecurityKNOWBE4MULTI-FACTORAUTHENTICATION(MFA)PASSWORDSPRAYINGSOCIALENGINEERINGInternetofThingsQRCodeScamsSpoofingSocialMediaScamsANNUALSECURITYTRAININGARTIFICIALINTELLIGENCEMALWAREPASSWORDSTRENGTHMETERDataPrivacyMobileApplicationManagement(MAM)TrojanHorsePHISHINGIDENTITYTHEFTRANSOMWAREHackerVISHINGCYBERSECURITYAWARENESSMONTHInformationSecurityPolicyTechSHARINGSENSITIVEDATACHATGPTVirusPASSPHRASEPhishAlertButton(PAB)DataBreachVPN(VirtualPrivateNetwork)USBPublicWi-FiBUSINESSEMAILCOMPROMISE(BEC)SMISHINGEncryptionCYBERSECURITYHYGIENESECURITYAWARENESSCloudSecurityKNOWBE4MULTI-FACTORAUTHENTICATION(MFA)PASSWORDSPRAYINGSOCIALENGINEERINGInternetofThingsQRCodeScamsSpoofingSocialMediaScamsANNUALSECURITYTRAININGARTIFICIALINTELLIGENCEMALWAREPASSWORDSTRENGTHMETERDataPrivacyMobileApplicationManagement(MAM)TrojanHorsePHISHINGIDENTITYTHEFTRANSOMWAREHackerVISHINGCYBERSECURITYAWARENESSMONTHInformationSecurityPolicyTechSHARINGSENSITIVEDATACHATGPTVirusPASSPHRASEPhishAlertButton(PAB)DataBreachVPN(VirtualPrivateNetwork)USBPublicWi-FiBUSINESSEMAILCOMPROMISE(BEC)SMISHINGEncryptionCYBERSECURITYHYGIENESECURITYAWARENESS

Cybersecurity BINGO! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. Cloud Security
  2. KNOWBE4
  3. MULTI-FACTOR AUTHENTICATION (MFA)
  4. PASSWORD SPRAYING
  5. SOCIAL ENGINEERING
  6. Internet of Things
  7. QR Code Scams
  8. Spoofing
  9. Social Media Scams
  10. ANNUAL SECURITY TRAINING
  11. ARTIFICIAL INTELLIGENCE
  12. MALWARE
  13. PASSWORD STRENGTH METER
  14. Data Privacy
  15. Mobile Application Management (MAM)
  16. Trojan Horse
  17. PHISHING
  18. IDENTITY THEFT
  19. RANSOMWARE
  20. Hacker
  21. VISHING
  22. CYBERSECURITY AWARENESS MONTH
  23. Information Security
  24. PolicyTech
  25. SHARING SENSITIVE DATA
  26. CHATGPT
  27. Virus
  28. PASSPHRASE
  29. Phish Alert Button (PAB)
  30. Data Breach
  31. VPN (Virtual Private Network)
  32. USB
  33. Public Wi-Fi
  34. BUSINESS EMAIL COMPROMISE (BEC)
  35. SMISHING
  36. Encryption
  37. CYBERSECURITY HYGIENE
  38. SECURITY AWARENESS