Firewall Lock your screen VPN Spoofing Phishing Internet Scams Password Worm Fraud Breach Software NIST Free! Security Threat Risk assessment Hardware Protect Patrick Cordova Cyber Data Destruction Badge Cyber Serucity Privacy Data Protection SSO Trojan horse Information Technology Service Desk Multi-factor authentication HITECH Vulnerability Cloud "Patch"es O'Houlihan Workstation Encrypt Computer Virus Computer Firewall Lock your screen VPN Spoofing Phishing Internet Scams Password Worm Fraud Breach Software NIST Free! Security Threat Risk assessment Hardware Protect Patrick Cordova Cyber Data Destruction Badge Cyber Serucity Privacy Data Protection SSO Trojan horse Information Technology Service Desk Multi-factor authentication HITECH Vulnerability Cloud "Patch"es O'Houlihan Workstation Encrypt Computer Virus Computer
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Firewall
Lock your screen
VPN
Spoofing
Phishing
Internet
Scams
Password
Worm
Fraud
Breach
Software
NIST
Free!
Security Threat
Risk assessment
Hardware
Protect
Patrick Cordova
Cyber
Data Destruction
Badge
Cyber Serucity
Privacy
Data Protection
SSO
Trojan horse
Information Technology
Service Desk
Multi-factor authentication
HITECH
Vulnerability
Cloud
"Patch"es O'Houlihan
Workstation
Encrypt
Computer Virus
Computer