(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Debunk a common cybersecurity myth
Find a cybersecurity article or video and share a key takeaway
Complete the Cyber Trivia Challenge (linked on the #CySAM SharePoint page)
Report a suspicious email
Match a cybersecurity threat to its defence strategy
List two ways to spot a deepfake
Share a security tip with someone
Say why an .exe file might be dangerous
Locate one of the 14 Cybersecurity floor banners
Use a secure method to share a file
Describe one way attackers exploit human behaviour
Mention a recent cybersecurity incident you’ve heard about
Read at least one past Cyber Resilience newsletter
Give one reason why reusing passwords is risky
Find and point out a CySAM poster
Talk to a colleague about CySAM
Collect a pack of “Whoops” post-it notes from the Cyber Resilience Team
Spot three phishing red flags
Name a psychological trick used in phishing attacks
Explain what MFA is and why it’s important
Identify a phishing or smishing message from your personal inbox
Lock your screen before stepping away from your desk