Multi-factor authentication Computer Virus Spoofing Privacy Firewall Vulnerability Password Cyber Serucity Phishing Security Threat Data Protection Computer Workstation Scams Cyber Hardware "Patch"es O'Houlihan Data Destruction Service Desk VPN HITECH Lock your screen Software NIST Badge Cloud Fraud Encrypt Breach Patrick Cordova Free! Information Technology Protect SSO Internet Worm Risk assessment Trojan horse Multi-factor authentication Computer Virus Spoofing Privacy Firewall Vulnerability Password Cyber Serucity Phishing Security Threat Data Protection Computer Workstation Scams Cyber Hardware "Patch"es O'Houlihan Data Destruction Service Desk VPN HITECH Lock your screen Software NIST Badge Cloud Fraud Encrypt Breach Patrick Cordova Free! Information Technology Protect SSO Internet Worm Risk assessment Trojan horse
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Multi-factor authentication
Computer Virus
Spoofing
Privacy
Firewall
Vulnerability
Password
Cyber Serucity
Phishing
Security Threat
Data Protection
Computer
Workstation
Scams
Cyber
Hardware
"Patch"es O'Houlihan
Data Destruction
Service Desk
VPN
HITECH
Lock your screen
Software
NIST
Badge
Cloud
Fraud
Encrypt
Breach
Patrick Cordova
Free!
Information Technology
Protect
SSO
Internet
Worm
Risk assessment
Trojan horse