Cloud Security KNOWBE4 MULTI-FACTOR AUTHENTICATION (MFA) PASSWORD SPRAYING SOCIAL ENGINEERING Internet of Things QR Code Scams Spoofing Social Media Scams ANNUAL SECURITY TRAINING ARTIFICIAL INTELLIGENCE MALWARE PASSWORD STRENGTH METER Data Privacy Mobile Application Management (MAM) Trojan Horse PHISHING IDENTITY THEFT RANSOMWARE Hacker VISHING CYBERSECURITY AWARENESS MONTH Information Security PolicyTech SHARING SENSITIVE DATA CHATGPT Virus PASSPHRASE Phish Alert Button (PAB) Data Breach VPN (Virtual Private Network) USB Public Wi-Fi BUSINESS EMAIL COMPROMISE (BEC) SMISHING Encryption CYBERSECURITY HYGIENE SECURITY AWARENESS Cloud Security KNOWBE4 MULTI-FACTOR AUTHENTICATION (MFA) PASSWORD SPRAYING SOCIAL ENGINEERING Internet of Things QR Code Scams Spoofing Social Media Scams ANNUAL SECURITY TRAINING ARTIFICIAL INTELLIGENCE MALWARE PASSWORD STRENGTH METER Data Privacy Mobile Application Management (MAM) Trojan Horse PHISHING IDENTITY THEFT RANSOMWARE Hacker VISHING CYBERSECURITY AWARENESS MONTH Information Security PolicyTech SHARING SENSITIVE DATA CHATGPT Virus PASSPHRASE Phish Alert Button (PAB) Data Breach VPN (Virtual Private Network) USB Public Wi-Fi BUSINESS EMAIL COMPROMISE (BEC) SMISHING Encryption CYBERSECURITY HYGIENE SECURITY AWARENESS
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cloud Security
KNOWBE4
MULTI-FACTOR AUTHENTICATION (MFA)
PASSWORD SPRAYING
SOCIAL ENGINEERING
Internet of Things
QR Code Scams
Spoofing
Social Media Scams
ANNUAL SECURITY TRAINING
ARTIFICIAL INTELLIGENCE
MALWARE
PASSWORD STRENGTH METER
Data Privacy
Mobile Application Management (MAM)
Trojan Horse
PHISHING
IDENTITY THEFT
RANSOMWARE
Hacker
VISHING
CYBERSECURITY AWARENESS MONTH
Information Security
PolicyTech
SHARING SENSITIVE DATA
CHATGPT
Virus
PASSPHRASE
Phish Alert Button (PAB)
Data Breach
VPN (Virtual Private Network)
USB
Public Wi-Fi
BUSINESS EMAIL COMPROMISE (BEC)
SMISHING
Encryption
CYBERSECURITY HYGIENE
SECURITY AWARENESS