Device PHI Vulnerability OneDrive Work Intrusion prevention system (IPS) Internet service provider (ISP) Multi-Factor Authentication Login Legal SharePoint DMZ Verify Internet Click PII 2FA (Two factor authentication) Disable Twitter Malicious Email Information Malware Authentication Encryption Risk Instagram Cyber Website Security information and event management (SIEM) Router Suspicious KnowBe4 Identify Data Breach Virtual private network (VPN) Protected Username Threat Decryption Password Smishing TLS 1.2 Personal Exchange Intranet Cisco Firewall Facebook Ethernet Vishing Vishing Mobile Wi- Fi Outlook Server Smishing Security Phishing Responsibility Certificate Intrusion detection system (IDS) Device PHI Vulnerability OneDrive Work Intrusion prevention system (IPS) Internet service provider (ISP) Multi-Factor Authentication Login Legal SharePoint DMZ Verify Internet Click PII 2FA (Two factor authentication) Disable Twitter Malicious Email Information Malware Authentication Encryption Risk Instagram Cyber Website Security information and event management (SIEM) Router Suspicious KnowBe4 Identify Data Breach Virtual private network (VPN) Protected Username Threat Decryption Password Smishing TLS 1.2 Personal Exchange Intranet Cisco Firewall Facebook Ethernet Vishing Vishing Mobile Wi- Fi Outlook Server Smishing Security Phishing Responsibility Certificate Intrusion detection system (IDS)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Device
PHI
Vulnerability
OneDrive
Work
Intrusion prevention system (IPS)
Internet service provider (ISP)
Multi-Factor Authentication
Login
Legal
SharePoint
DMZ
Verify
Internet
Click
PII
2FA (Two factor authentication)
Disable
Twitter
Malicious
Email
Information
Malware
Authentication
Encryption
Risk
Instagram
Cyber
Website
Security information and event management (SIEM)
Router
Suspicious
KnowBe4
Identify
Data Breach
Virtual private network (VPN)
Protected
Username
Threat
Decryption
Password
Smishing
TLS 1.2
Personal
Exchange
Intranet
Cisco
Firewall
Facebook
Ethernet
Vishing
Vishing
Mobile
Wi-Fi
Outlook
Server
Smishing
Security
Phishing
Responsibility
Certificate
Intrusion detection system (IDS)