Internet service provider (ISP) Work Vishing PHI Malicious Website Intrusion detection system (IDS) Security Login Cyber Facebook Identify Exchange Multi-Factor Authentication Instagram Username DMZ Mobile Outlook Cisco Personal Firewall Wi- Fi Password Phishing Disable Certificate Click 2FA (Two factor authentication) Server Data Breach Threat Virtual private network (VPN) Smishing Ethernet TLS 1.2 Authentication Intranet Decryption Intrusion prevention system (IPS) Suspicious Encryption Router Responsibility Smishing KnowBe4 Legal Email PII Vishing Information Device SharePoint Security information and event management (SIEM) Verify Internet Malware Protected Twitter Risk Vulnerability OneDrive Internet service provider (ISP) Work Vishing PHI Malicious Website Intrusion detection system (IDS) Security Login Cyber Facebook Identify Exchange Multi-Factor Authentication Instagram Username DMZ Mobile Outlook Cisco Personal Firewall Wi- Fi Password Phishing Disable Certificate Click 2FA (Two factor authentication) Server Data Breach Threat Virtual private network (VPN) Smishing Ethernet TLS 1.2 Authentication Intranet Decryption Intrusion prevention system (IPS) Suspicious Encryption Router Responsibility Smishing KnowBe4 Legal Email PII Vishing Information Device SharePoint Security information and event management (SIEM) Verify Internet Malware Protected Twitter Risk Vulnerability OneDrive
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Internet service provider (ISP)
Work
Vishing
PHI
Malicious
Website
Intrusion detection system (IDS)
Security
Login
Cyber
Facebook
Identify
Exchange
Multi-Factor Authentication
Instagram
Username
DMZ
Mobile
Outlook
Cisco
Personal
Firewall
Wi-Fi
Password
Phishing
Disable
Certificate
Click
2FA (Two factor authentication)
Server
Data Breach
Threat
Virtual private network (VPN)
Smishing
Ethernet
TLS 1.2
Authentication
Intranet
Decryption
Intrusion prevention system (IPS)
Suspicious
Encryption
Router
Responsibility
Smishing
KnowBe4
Legal
Email
PII
Vishing
Information
Device
SharePoint
Security information and event management (SIEM)
Verify
Internet
Malware
Protected
Twitter
Risk
Vulnerability
OneDrive