Data Breach PII Server Malware Username Router Verify TLS 1.2 Firewall Encryption Phishing Responsibility Protected SharePoint Ethernet Suspicious Virtual private network (VPN) Click Decryption OneDrive PHI Internet Intranet 2FA (Two factor authentication) Internet service provider (ISP) Vishing Security Website Cyber Threat Wi- Fi Intrusion prevention system (IPS) Certificate Vulnerability DMZ Malicious Risk Authentication Identify Intrusion detection system (IDS) Email Personal Password Device Information Login Data Breach PII Server Malware Username Router Verify TLS 1.2 Firewall Encryption Phishing Responsibility Protected SharePoint Ethernet Suspicious Virtual private network (VPN) Click Decryption OneDrive PHI Internet Intranet 2FA (Two factor authentication) Internet service provider (ISP) Vishing Security Website Cyber Threat Wi- Fi Intrusion prevention system (IPS) Certificate Vulnerability DMZ Malicious Risk Authentication Identify Intrusion detection system (IDS) Email Personal Password Device Information Login
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Breach
PII
Server
Malware
Username
Router
Verify
TLS 1.2
Firewall
Encryption
Phishing
Responsibility
Protected
SharePoint
Ethernet
Suspicious
Virtual private network (VPN)
Click
Decryption
OneDrive
PHI
Internet
Intranet
2FA (Two factor authentication)
Internet service provider (ISP)
Vishing
Security
Website
Cyber
Threat
Wi-Fi
Intrusion prevention system (IPS)
Certificate
Vulnerability
DMZ
Malicious
Risk
Authentication
Identify
Intrusion detection system (IDS)
Email
Personal
Password
Device
Information
Login