Encrypt Service Desk Protect Cyber NIST Vulnerability Badge Spoofing Data Protection Risk assessment HITECH Computer Virus SSO Trojan horse Password Fraud Privacy Free! Cloud Computer Scams Cyber Serucity Patrick Cordova Phishing Firewall Internet Information Technology Data Destruction Workstation Hardware Software Worm Breach Security Threat Multi-factor authentication "Patch"es O'Houlihan VPN Lock your screen Encrypt Service Desk Protect Cyber NIST Vulnerability Badge Spoofing Data Protection Risk assessment HITECH Computer Virus SSO Trojan horse Password Fraud Privacy Free! Cloud Computer Scams Cyber Serucity Patrick Cordova Phishing Firewall Internet Information Technology Data Destruction Workstation Hardware Software Worm Breach Security Threat Multi-factor authentication "Patch"es O'Houlihan VPN Lock your screen
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Encrypt
Service Desk
Protect
Cyber
NIST
Vulnerability
Badge
Spoofing
Data Protection
Risk assessment
HITECH
Computer Virus
SSO
Trojan horse
Password
Fraud
Privacy
Free!
Cloud
Computer
Scams
Cyber Serucity
Patrick Cordova
Phishing
Firewall
Internet
Information Technology
Data Destruction
Workstation
Hardware
Software
Worm
Breach
Security Threat
Multi-factor authentication
"Patch"es O'Houlihan
VPN
Lock your screen