VPN(VirtualPrivateNetwork)PASSWORDSTRENGTHMETERDataBreachSpoofingQRCodeScamsCloudSecurityInformationSecurityIDENTITYTHEFTDataPrivacySHARINGSENSITIVEDATAEncryptionVirusPublicWi-FiMobileApplicationManagement(MAM)CYBERSECURITYAWARENESSMONTHSECURITYAWARENESSKNOWBE4SOCIALENGINEERINGVISHINGUSBSocialMediaScamsRANSOMWAREHackerARTIFICIALINTELLIGENCETrojanHorseMALWAREPHISHINGPolicyTechInternetofThingsMULTI-FACTORAUTHENTICATION(MFA)PhishAlertButton(PAB)PASSWORDSPRAYINGSMISHINGPASSPHRASEANNUALSECURITYTRAININGCYBERSECURITYHYGIENECHATGPTBUSINESSEMAILCOMPROMISE(BEC)VPN(VirtualPrivateNetwork)PASSWORDSTRENGTHMETERDataBreachSpoofingQRCodeScamsCloudSecurityInformationSecurityIDENTITYTHEFTDataPrivacySHARINGSENSITIVEDATAEncryptionVirusPublicWi-FiMobileApplicationManagement(MAM)CYBERSECURITYAWARENESSMONTHSECURITYAWARENESSKNOWBE4SOCIALENGINEERINGVISHINGUSBSocialMediaScamsRANSOMWAREHackerARTIFICIALINTELLIGENCETrojanHorseMALWAREPHISHINGPolicyTechInternetofThingsMULTI-FACTORAUTHENTICATION(MFA)PhishAlertButton(PAB)PASSWORDSPRAYINGSMISHINGPASSPHRASEANNUALSECURITYTRAININGCYBERSECURITYHYGIENECHATGPTBUSINESSEMAILCOMPROMISE(BEC)

Cybersecurity BINGO! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. VPN (Virtual Private Network)
  2. PASSWORD STRENGTH METER
  3. Data Breach
  4. Spoofing
  5. QR Code Scams
  6. Cloud Security
  7. Information Security
  8. IDENTITY THEFT
  9. Data Privacy
  10. SHARING SENSITIVE DATA
  11. Encryption
  12. Virus
  13. Public Wi-Fi
  14. Mobile Application Management (MAM)
  15. CYBERSECURITY AWARENESS MONTH
  16. SECURITY AWARENESS
  17. KNOWBE4
  18. SOCIAL ENGINEERING
  19. VISHING
  20. USB
  21. Social Media Scams
  22. RANSOMWARE
  23. Hacker
  24. ARTIFICIAL INTELLIGENCE
  25. Trojan Horse
  26. MALWARE
  27. PHISHING
  28. PolicyTech
  29. Internet of Things
  30. MULTI-FACTOR AUTHENTICATION (MFA)
  31. Phish Alert Button (PAB)
  32. PASSWORD SPRAYING
  33. SMISHING
  34. PASSPHRASE
  35. ANNUAL SECURITY TRAINING
  36. CYBERSECURITY HYGIENE
  37. CHATGPT
  38. BUSINESS EMAIL COMPROMISE (BEC)