(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Share a security tip with someone
Name a psychological trick used in phishing attacks
Find a cybersecurity article or video and share a key takeaway
Complete the Cyber Trivia Challenge (linked on the #CySAM SharePoint page)
Talk to a colleague about CySAM
List two ways to spot a deepfake
Use a secure method to share a file
Lock your screen before stepping away from your desk
Describe one way attackers exploit human behaviour
Match a cybersecurity threat to its defence strategy
Locate one of the 14 Cybersecurity floor banners
Collect a pack of “Whoops” post-it notes from the Cyber Resilience Team
Report a suspicious email
Give one reason why reusing passwords is risky
Identify a phishing or smishing message from your personal inbox
Say why an .exe file might be dangerous
Spot three phishing red flags
Mention a recent cybersecurity incident you’ve heard about
Explain how QR code scams work
Name one consequence of a data breach
Debunk a common cybersecurity myth
Explain what MFA is and why it’s important
Find and point out a CySAM poster
Read at least one past Cyber Resilience newsletter