Spot threephishingred flagsComplete theCyber TriviaChallenge (linkedon the #CySAMSharePoint page)Talk to acolleagueaboutCySAMUse asecuremethod toshare a fileFind acybersecurityarticle or videoand share akey takeawayLock yourscreen beforesteppingaway fromyour deskRead atleast onepast CyberResiliencenewsletterName apsychologicaltrick used inphishingattacksMention arecentcybersecurityincident you’veheard aboutMatch acybersecuritythreat to itsdefencestrategyCollect a packof “Whoops”post-it notesfrom the CyberResilienceTeamLocate one ofthe 14Cybersecurityfloor bannersExplain howQR codescams workIdentify aphishing orsmishingmessage fromyour personalinboxExplainwhat MFA isand why it’simportantReport asuspiciousemailTake partin aCySAMactivityDescribe oneway attackersexploithumanbehaviourName oneconsequenceof a databreachShare asecuritytip withsomeoneList twoways tospot adeepfakeGive onereason whyreusingpasswords isriskyFind andpoint outa CySAMposterDebunk acommoncybersecuritymythSay whyan .exe filemight bedangerousSpot threephishingred flagsComplete theCyber TriviaChallenge (linkedon the #CySAMSharePoint page)Talk to acolleagueaboutCySAMUse asecuremethod toshare a fileFind acybersecurityarticle or videoand share akey takeawayLock yourscreen beforesteppingaway fromyour deskRead atleast onepast CyberResiliencenewsletterName apsychologicaltrick used inphishingattacksMention arecentcybersecurityincident you’veheard aboutMatch acybersecuritythreat to itsdefencestrategyCollect a packof “Whoops”post-it notesfrom the CyberResilienceTeamLocate one ofthe 14Cybersecurityfloor bannersExplain howQR codescams workIdentify aphishing orsmishingmessage fromyour personalinboxExplainwhat MFA isand why it’simportantReport asuspiciousemailTake partin aCySAMactivityDescribe oneway attackersexploithumanbehaviourName oneconsequenceof a databreachShare asecuritytip withsomeoneList twoways tospot adeepfakeGive onereason whyreusingpasswords isriskyFind andpoint outa CySAMposterDebunk acommoncybersecuritymythSay whyan .exe filemight bedangerous

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Spot three phishing red flags
  2. Complete the Cyber Trivia Challenge (linked on the #CySAM SharePoint page)
  3. Talk to a colleague about CySAM
  4. Use a secure method to share a file
  5. Find a cybersecurity article or video and share a key takeaway
  6. Lock your screen before stepping away from your desk
  7. Read at least one past Cyber Resilience newsletter
  8. Name a psychological trick used in phishing attacks
  9. Mention a recent cybersecurity incident you’ve heard about
  10. Match a cybersecurity threat to its defence strategy
  11. Collect a pack of “Whoops” post-it notes from the Cyber Resilience Team
  12. Locate one of the 14 Cybersecurity floor banners
  13. Explain how QR code scams work
  14. Identify a phishing or smishing message from your personal inbox
  15. Explain what MFA is and why it’s important
  16. Report a suspicious email
  17. Take part in a CySAM activity
  18. Describe one way attackers exploit human behaviour
  19. Name one consequence of a data breach
  20. Share a security tip with someone
  21. List two ways to spot a deepfake
  22. Give one reason why reusing passwords is risky
  23. Find and point out a CySAM poster
  24. Debunk a common cybersecurity myth
  25. Say why an .exe file might be dangerous