Multi-factor authentication Spoofing Cloud Fraud Cyber Service Desk Trojan horse Data Destruction Breach Badge Patrick Cordova Information Technology Phishing SSO Cyber Serucity Workstation Internet Security Threat Encrypt VPN Scams Privacy Free! Software HITECH Data Protection Computer Virus Protect Computer Hardware Firewall Password Worm Lock your screen "Patch"es O'Houlihan Vulnerability Risk assessment NIST Multi-factor authentication Spoofing Cloud Fraud Cyber Service Desk Trojan horse Data Destruction Breach Badge Patrick Cordova Information Technology Phishing SSO Cyber Serucity Workstation Internet Security Threat Encrypt VPN Scams Privacy Free! Software HITECH Data Protection Computer Virus Protect Computer Hardware Firewall Password Worm Lock your screen "Patch"es O'Houlihan Vulnerability Risk assessment NIST
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Multi-factor authentication
Spoofing
Cloud
Fraud
Cyber
Service Desk
Trojan horse
Data Destruction
Breach
Badge
Patrick Cordova
Information Technology
Phishing
SSO
Cyber Serucity
Workstation
Internet
Security Threat
Encrypt
VPN
Scams
Privacy
Free!
Software
HITECH
Data Protection
Computer Virus
Protect
Computer
Hardware
Firewall
Password
Worm
Lock your screen
"Patch"es O'Houlihan
Vulnerability
Risk assessment
NIST