(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Name a psychological trick used in phishing attacks
Debunk a common cybersecurity myth
Talk to a colleague about CySAM
Complete the Cyber Trivia Challenge (linked on the #CySAM SharePoint page)
Read at least one past Cyber Resilience newsletter
Collect a pack of “Whoops” post-it notes from the Cyber Resilience Team
Match a cybersecurity threat to its defence strategy
Find and point out a CySAM poster
Mention a recent cybersecurity incident you’ve heard about
Give one reason why reusing passwords is risky
Lock your screen before stepping away from your desk
Find a cybersecurity article or video and share a key takeaway
Report a suspicious email
Describe one way attackers exploit human behaviour
Locate one of the 14 Cybersecurity floor banners
List two ways to spot a deepfake
Explain what MFA is and why it’s important
Take part in a CySAM activity
Spot three phishing red flags
Identify a phishing or smishing message from your personal inbox