Debunk acommoncybersecuritymythFind acybersecurityarticle or videoand share akey takeawayComplete theCyber TriviaChallenge (linkedon the #CySAMSharePoint page)Report asuspiciousemailMatch acybersecuritythreat to itsdefencestrategyList twoways tospot adeepfakeShare asecuritytip withsomeoneSay whyan .exe filemight bedangerousLocate one ofthe 14Cybersecurityfloor bannersUse asecuremethod toshare a fileDescribe oneway attackersexploithumanbehaviourMention arecentcybersecurityincident you’veheard aboutRead atleast onepast CyberResiliencenewsletterGive onereason whyreusingpasswords isriskyFind andpoint outa CySAMposterTalk to acolleagueaboutCySAMCollect a packof “Whoops”post-it notesfrom the CyberResilienceTeamSpot threephishingred flagsName apsychologicaltrick used inphishingattacksExplainwhat MFA isand why it’simportantIdentify aphishing orsmishingmessage fromyour personalinboxLock yourscreen beforesteppingaway fromyour deskExplain howQR codescams workTake partin aCySAMactivityName oneconsequenceof a databreachDebunk acommoncybersecuritymythFind acybersecurityarticle or videoand share akey takeawayComplete theCyber TriviaChallenge (linkedon the #CySAMSharePoint page)Report asuspiciousemailMatch acybersecuritythreat to itsdefencestrategyList twoways tospot adeepfakeShare asecuritytip withsomeoneSay whyan .exe filemight bedangerousLocate one ofthe 14Cybersecurityfloor bannersUse asecuremethod toshare a fileDescribe oneway attackersexploithumanbehaviourMention arecentcybersecurityincident you’veheard aboutRead atleast onepast CyberResiliencenewsletterGive onereason whyreusingpasswords isriskyFind andpoint outa CySAMposterTalk to acolleagueaboutCySAMCollect a packof “Whoops”post-it notesfrom the CyberResilienceTeamSpot threephishingred flagsName apsychologicaltrick used inphishingattacksExplainwhat MFA isand why it’simportantIdentify aphishing orsmishingmessage fromyour personalinboxLock yourscreen beforesteppingaway fromyour deskExplain howQR codescams workTake partin aCySAMactivityName oneconsequenceof a databreach

Untitled Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Debunk a common cybersecurity myth
  2. Find a cybersecurity article or video and share a key takeaway
  3. Complete the Cyber Trivia Challenge (linked on the #CySAM SharePoint page)
  4. Report a suspicious email
  5. Match a cybersecurity threat to its defence strategy
  6. List two ways to spot a deepfake
  7. Share a security tip with someone
  8. Say why an .exe file might be dangerous
  9. Locate one of the 14 Cybersecurity floor banners
  10. Use a secure method to share a file
  11. Describe one way attackers exploit human behaviour
  12. Mention a recent cybersecurity incident you’ve heard about
  13. Read at least one past Cyber Resilience newsletter
  14. Give one reason why reusing passwords is risky
  15. Find and point out a CySAM poster
  16. Talk to a colleague about CySAM
  17. Collect a pack of “Whoops” post-it notes from the Cyber Resilience Team
  18. Spot three phishing red flags
  19. Name a psychological trick used in phishing attacks
  20. Explain what MFA is and why it’s important
  21. Identify a phishing or smishing message from your personal inbox
  22. Lock your screen before stepping away from your desk
  23. Explain how QR code scams work
  24. Take part in a CySAM activity
  25. Name one consequence of a data breach