Share asecuritytip withsomeoneName apsychologicaltrick used inphishingattacksFind acybersecurityarticle or videoand share akey takeawayComplete theCyber TriviaChallenge (linkedon the #CySAMSharePoint page)Talk to acolleagueaboutCySAMList twoways tospot adeepfakeUse asecuremethod toshare a fileLock yourscreen beforesteppingaway fromyour deskDescribe oneway attackersexploithumanbehaviourMatch acybersecuritythreat to itsdefencestrategyLocate one ofthe 14Cybersecurityfloor bannersCollect a packof “Whoops”post-it notesfrom the CyberResilienceTeamReport asuspiciousemailGive onereason whyreusingpasswords isriskyIdentify aphishing orsmishingmessage fromyour personalinboxSay whyan .exe filemight bedangerousSpot threephishingred flagsMention arecentcybersecurityincident you’veheard aboutExplain howQR codescams workName oneconsequenceof a databreachDebunk acommoncybersecuritymythExplainwhat MFA isand why it’simportantFind andpoint outa CySAMposterRead atleast onepast CyberResiliencenewsletterTake partin aCySAMactivityShare asecuritytip withsomeoneName apsychologicaltrick used inphishingattacksFind acybersecurityarticle or videoand share akey takeawayComplete theCyber TriviaChallenge (linkedon the #CySAMSharePoint page)Talk to acolleagueaboutCySAMList twoways tospot adeepfakeUse asecuremethod toshare a fileLock yourscreen beforesteppingaway fromyour deskDescribe oneway attackersexploithumanbehaviourMatch acybersecuritythreat to itsdefencestrategyLocate one ofthe 14Cybersecurityfloor bannersCollect a packof “Whoops”post-it notesfrom the CyberResilienceTeamReport asuspiciousemailGive onereason whyreusingpasswords isriskyIdentify aphishing orsmishingmessage fromyour personalinboxSay whyan .exe filemight bedangerousSpot threephishingred flagsMention arecentcybersecurityincident you’veheard aboutExplain howQR codescams workName oneconsequenceof a databreachDebunk acommoncybersecuritymythExplainwhat MFA isand why it’simportantFind andpoint outa CySAMposterRead atleast onepast CyberResiliencenewsletterTake partin aCySAMactivity

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Share a security tip with someone
  2. Name a psychological trick used in phishing attacks
  3. Find a cybersecurity article or video and share a key takeaway
  4. Complete the Cyber Trivia Challenge (linked on the #CySAM SharePoint page)
  5. Talk to a colleague about CySAM
  6. List two ways to spot a deepfake
  7. Use a secure method to share a file
  8. Lock your screen before stepping away from your desk
  9. Describe one way attackers exploit human behaviour
  10. Match a cybersecurity threat to its defence strategy
  11. Locate one of the 14 Cybersecurity floor banners
  12. Collect a pack of “Whoops” post-it notes from the Cyber Resilience Team
  13. Report a suspicious email
  14. Give one reason why reusing passwords is risky
  15. Identify a phishing or smishing message from your personal inbox
  16. Say why an .exe file might be dangerous
  17. Spot three phishing red flags
  18. Mention a recent cybersecurity incident you’ve heard about
  19. Explain how QR code scams work
  20. Name one consequence of a data breach
  21. Debunk a common cybersecurity myth
  22. Explain what MFA is and why it’s important
  23. Find and point out a CySAM poster
  24. Read at least one past Cyber Resilience newsletter
  25. Take part in a CySAM activity