VPN (Virtual Private Network) PASSWORD STRENGTH METER Data Breach Spoofing QR Code Scams Cloud Security Information Security IDENTITY THEFT Data Privacy SHARING SENSITIVE DATA Encryption Virus Public Wi-Fi Mobile Application Management (MAM) CYBERSECURITY AWARENESS MONTH SECURITY AWARENESS KNOWBE4 SOCIAL ENGINEERING VISHING USB Social Media Scams RANSOMWARE Hacker ARTIFICIAL INTELLIGENCE Trojan Horse MALWARE PHISHING PolicyTech Internet of Things MULTI-FACTOR AUTHENTICATION (MFA) Phish Alert Button (PAB) PASSWORD SPRAYING SMISHING PASSPHRASE ANNUAL SECURITY TRAINING CYBERSECURITY HYGIENE CHATGPT BUSINESS EMAIL COMPROMISE (BEC) VPN (Virtual Private Network) PASSWORD STRENGTH METER Data Breach Spoofing QR Code Scams Cloud Security Information Security IDENTITY THEFT Data Privacy SHARING SENSITIVE DATA Encryption Virus Public Wi-Fi Mobile Application Management (MAM) CYBERSECURITY AWARENESS MONTH SECURITY AWARENESS KNOWBE4 SOCIAL ENGINEERING VISHING USB Social Media Scams RANSOMWARE Hacker ARTIFICIAL INTELLIGENCE Trojan Horse MALWARE PHISHING PolicyTech Internet of Things MULTI-FACTOR AUTHENTICATION (MFA) Phish Alert Button (PAB) PASSWORD SPRAYING SMISHING PASSPHRASE ANNUAL SECURITY TRAINING CYBERSECURITY HYGIENE CHATGPT BUSINESS EMAIL COMPROMISE (BEC)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
VPN (Virtual Private Network)
PASSWORD STRENGTH METER
Data Breach
Spoofing
QR Code Scams
Cloud Security
Information Security
IDENTITY THEFT
Data Privacy
SHARING SENSITIVE DATA
Encryption
Virus
Public Wi-Fi
Mobile Application Management (MAM)
CYBERSECURITY AWARENESS MONTH
SECURITY AWARENESS
KNOWBE4
SOCIAL ENGINEERING
VISHING
USB
Social Media Scams
RANSOMWARE
Hacker
ARTIFICIAL INTELLIGENCE
Trojan Horse
MALWARE
PHISHING
PolicyTech
Internet of Things
MULTI-FACTOR AUTHENTICATION (MFA)
Phish Alert Button (PAB)
PASSWORD SPRAYING
SMISHING
PASSPHRASE
ANNUAL SECURITY TRAINING
CYBERSECURITY HYGIENE
CHATGPT
BUSINESS EMAIL COMPROMISE (BEC)