Information Technology Risk assessment Worm Breach Hardware Fraud Patrick Cordova Computer Phishing Trojan horse Internet Lock your screen Data Protection Cloud Scams Password Protect Spoofing Data Destruction Encrypt Privacy VPN Firewall Free! Software Cyber Serucity SSO Security Threat "Patch"es O'Houlihan NIST Service Desk Cyber Vulnerability Badge HITECH Computer Virus Multi-factor authentication Workstation Information Technology Risk assessment Worm Breach Hardware Fraud Patrick Cordova Computer Phishing Trojan horse Internet Lock your screen Data Protection Cloud Scams Password Protect Spoofing Data Destruction Encrypt Privacy VPN Firewall Free! Software Cyber Serucity SSO Security Threat "Patch"es O'Houlihan NIST Service Desk Cyber Vulnerability Badge HITECH Computer Virus Multi-factor authentication Workstation
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Information Technology
Risk assessment
Worm
Breach
Hardware
Fraud
Patrick Cordova
Computer
Phishing
Trojan horse
Internet
Lock your screen
Data Protection
Cloud
Scams
Password
Protect
Spoofing
Data Destruction
Encrypt
Privacy
VPN
Firewall
Free!
Software
Cyber Serucity
SSO
Security Threat
"Patch"es O'Houlihan
NIST
Service Desk
Cyber
Vulnerability
Badge
HITECH
Computer Virus
Multi-factor authentication
Workstation