ExploitWhitehatCloudRansomwareBreachRootkitHomeNetworkSecurityBlacklistDeepfakeTrojanAdwareMaximumSecurityDataProtectionBotAntivirusSpywareBYODInternetSecurityMalwareFirewallPayGuardBackdoorWormDDoSDataTheftVirusInsiderthreatPrivacyScannerEncryptionKeyloggerSecuritySoftwarePentestingFullScanClickjackingDomainPayGuardAPTQuickScanPhishingAuthenticatorVPNFolderShieldIPAddressHoneypotMuteModeVulnerabilityTrendMicroHackerBlackhatPrivacySocialEngineeringExploitWhitehatCloudRansomwareBreachRootkitHomeNetworkSecurityBlacklistDeepfakeTrojanAdwareMaximumSecurityDataProtectionBotAntivirusSpywareBYODInternetSecurityMalwareFirewallPayGuardBackdoorWormDDoSDataTheftVirusInsiderthreatPrivacyScannerEncryptionKeyloggerSecuritySoftwarePentestingFullScanClickjackingDomainPayGuardAPTQuickScanPhishingAuthenticatorVPNFolderShieldIPAddressHoneypotMuteModeVulnerabilityTrendMicroHackerBlackhatPrivacySocialEngineering

SECURITY STARTS WITH ME - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
  1. Exploit
  2. White hat
  3. Cloud
  4. Ransomware
  5. Breach
  6. Rootkit
  7. Home Network Security
  8. Blacklist
  9. Deepfake
  10. Trojan
  11. Adware
  12. Maximum Security
  13. Data Protection
  14. Bot
  15. Antivirus
  16. Spyware
  17. BYOD
  18. Internet Security
  19. Malware
  20. Firewall
  21. Pay Guard
  22. Backdoor
  23. Worm
  24. DDoS
  25. Data Theft
  26. Virus
  27. Insider threat
  28. Privacy Scanner
  29. Encryption
  30. Keylogger
  31. Security
  32. Software
  33. Pentesting
  34. Full Scan
  35. Clickjacking
  36. Domain
  37. Pay Guard
  38. APT
  39. Quick Scan
  40. Phishing
  41. Authenticator
  42. VPN
  43. Folder Shield
  44. IP Address
  45. Honeypot
  46. Mute Mode
  47. Vulnerability
  48. Trend Micro
  49. Hacker
  50. Black hat
  51. Privacy
  52. Social Engineering