Internet service provider (ISP) Intrusion detection system (IDS) Login Verify Phishing Facebook KnowBe4 Intrusion prevention system (IPS) PII Security information and event management (SIEM) PHI Disable Vishing DMZ 2FA (Two factor authentication) Data Breach Information Malicious OneDrive Instagram Suspicious Exchange Multi-Factor Authentication Device Twitter Internet Threat Smishing Work Certificate Cisco Server Authentication Vulnerability Firewall Smishing Cyber Legal SharePoint Username Decryption Malware Intranet Mobile Outlook Virtual private network (VPN) TLS 1.2 Email Protected Website Ethernet Click Security Vishing Wi- Fi Risk Responsibility Personal Identify Encryption Password Router Internet service provider (ISP) Intrusion detection system (IDS) Login Verify Phishing Facebook KnowBe4 Intrusion prevention system (IPS) PII Security information and event management (SIEM) PHI Disable Vishing DMZ 2FA (Two factor authentication) Data Breach Information Malicious OneDrive Instagram Suspicious Exchange Multi-Factor Authentication Device Twitter Internet Threat Smishing Work Certificate Cisco Server Authentication Vulnerability Firewall Smishing Cyber Legal SharePoint Username Decryption Malware Intranet Mobile Outlook Virtual private network (VPN) TLS 1.2 Email Protected Website Ethernet Click Security Vishing Wi- Fi Risk Responsibility Personal Identify Encryption Password Router
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Internet service provider (ISP)
Intrusion detection system (IDS)
Login
Verify
Phishing
Facebook
KnowBe4
Intrusion prevention system (IPS)
PII
Security information and event management (SIEM)
PHI
Disable
Vishing
DMZ
2FA (Two factor authentication)
Data Breach
Information
Malicious
OneDrive
Instagram
Suspicious
Exchange
Multi-Factor Authentication
Device
Twitter
Internet
Threat
Smishing
Work
Certificate
Cisco
Server
Authentication
Vulnerability
Firewall
Smishing
Cyber
Legal
SharePoint
Username
Decryption
Malware
Intranet
Mobile
Outlook
Virtual private network (VPN)
TLS 1.2
Email
Protected
Website
Ethernet
Click
Security
Vishing
Wi-Fi
Risk
Responsibility
Personal
Identify
Encryption
Password
Router