Name apsychologicaltrick used inphishingattacksDebunk acommoncybersecuritymythTalk to acolleagueaboutCySAMComplete theCyber TriviaChallenge (linkedon the #CySAMSharePoint page)Read atleast onepast CyberResiliencenewsletterCollect a packof “Whoops”post-it notesfrom the CyberResilienceTeamMatch acybersecuritythreat to itsdefencestrategyFind andpoint outa CySAMposterMention arecentcybersecurityincident you’veheard aboutGive onereason whyreusingpasswords isriskyLock yourscreen beforesteppingaway fromyour deskFind acybersecurityarticle or videoand share akey takeawayReport asuspiciousemailDescribe oneway attackersexploithumanbehaviourLocate one ofthe 14Cybersecurityfloor bannersList twoways tospot adeepfakeExplainwhat MFA isand why it’simportantTake partin aCySAMactivitySpot threephishingred flagsIdentify aphishing orsmishingmessage fromyour personalinboxName oneconsequenceof a databreachExplain howQR codescams workSay whyan .exe filemight bedangerousUse asecuremethod toshare a fileShare asecuritytip withsomeoneName apsychologicaltrick used inphishingattacksDebunk acommoncybersecuritymythTalk to acolleagueaboutCySAMComplete theCyber TriviaChallenge (linkedon the #CySAMSharePoint page)Read atleast onepast CyberResiliencenewsletterCollect a packof “Whoops”post-it notesfrom the CyberResilienceTeamMatch acybersecuritythreat to itsdefencestrategyFind andpoint outa CySAMposterMention arecentcybersecurityincident you’veheard aboutGive onereason whyreusingpasswords isriskyLock yourscreen beforesteppingaway fromyour deskFind acybersecurityarticle or videoand share akey takeawayReport asuspiciousemailDescribe oneway attackersexploithumanbehaviourLocate one ofthe 14Cybersecurityfloor bannersList twoways tospot adeepfakeExplainwhat MFA isand why it’simportantTake partin aCySAMactivitySpot threephishingred flagsIdentify aphishing orsmishingmessage fromyour personalinboxName oneconsequenceof a databreachExplain howQR codescams workSay whyan .exe filemight bedangerousUse asecuremethod toshare a fileShare asecuritytip withsomeone

Untitled Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Name a psychological trick used in phishing attacks
  2. Debunk a common cybersecurity myth
  3. Talk to a colleague about CySAM
  4. Complete the Cyber Trivia Challenge (linked on the #CySAM SharePoint page)
  5. Read at least one past Cyber Resilience newsletter
  6. Collect a pack of “Whoops” post-it notes from the Cyber Resilience Team
  7. Match a cybersecurity threat to its defence strategy
  8. Find and point out a CySAM poster
  9. Mention a recent cybersecurity incident you’ve heard about
  10. Give one reason why reusing passwords is risky
  11. Lock your screen before stepping away from your desk
  12. Find a cybersecurity article or video and share a key takeaway
  13. Report a suspicious email
  14. Describe one way attackers exploit human behaviour
  15. Locate one of the 14 Cybersecurity floor banners
  16. List two ways to spot a deepfake
  17. Explain what MFA is and why it’s important
  18. Take part in a CySAM activity
  19. Spot three phishing red flags
  20. Identify a phishing or smishing message from your personal inbox
  21. Name one consequence of a data breach
  22. Explain how QR code scams work
  23. Say why an .exe file might be dangerous
  24. Use a secure method to share a file
  25. Share a security tip with someone