HackerAPTPrivacyScannerBreachCloudInsiderthreatWhitehatRootkitEncryptionSpywareVirusBotSecurityExploitBYODVPNHoneypotPhishingDeepfakeBlacklistMalwarePentestingVulnerabilityDataTheftClickjackingIPAddressPayGuardWormQuickScanDDoSBlackhatAdwareSoftwarePayGuardRansomwareDomainTrojanSocialEngineeringMaximumSecurityAuthenticatorKeyloggerFirewallPrivacyFullScanMuteModeInternetSecurityFolderShieldDataProtectionHomeNetworkSecurityBackdoorTrendMicroAntivirusHackerAPTPrivacyScannerBreachCloudInsiderthreatWhitehatRootkitEncryptionSpywareVirusBotSecurityExploitBYODVPNHoneypotPhishingDeepfakeBlacklistMalwarePentestingVulnerabilityDataTheftClickjackingIPAddressPayGuardWormQuickScanDDoSBlackhatAdwareSoftwarePayGuardRansomwareDomainTrojanSocialEngineeringMaximumSecurityAuthenticatorKeyloggerFirewallPrivacyFullScanMuteModeInternetSecurityFolderShieldDataProtectionHomeNetworkSecurityBackdoorTrendMicroAntivirus

SECURITY STARTS WITH ME - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
  1. Hacker
  2. APT
  3. Privacy Scanner
  4. Breach
  5. Cloud
  6. Insider threat
  7. White hat
  8. Rootkit
  9. Encryption
  10. Spyware
  11. Virus
  12. Bot
  13. Security
  14. Exploit
  15. BYOD
  16. VPN
  17. Honeypot
  18. Phishing
  19. Deepfake
  20. Blacklist
  21. Malware
  22. Pentesting
  23. Vulnerability
  24. Data Theft
  25. Clickjacking
  26. IP Address
  27. Pay Guard
  28. Worm
  29. Quick Scan
  30. DDoS
  31. Black hat
  32. Adware
  33. Software
  34. Pay Guard
  35. Ransomware
  36. Domain
  37. Trojan
  38. Social Engineering
  39. Maximum Security
  40. Authenticator
  41. Keylogger
  42. Firewall
  43. Privacy
  44. Full Scan
  45. Mute Mode
  46. Internet Security
  47. Folder Shield
  48. Data Protection
  49. Home Network Security
  50. Backdoor
  51. Trend Micro
  52. Antivirus