RansomwareBlacklistAuthenticatorExploitDomainCloudWhitehatDDoSHackerPhishingSoftwarePentestingClickjackingVPNVirusHoneypotIPAddressFullScanBreachSecuritySocialEngineeringHomeNetworkSecurityDataProtectionWormBlackhatMaximumSecurityPayGuardMalwareFirewallVulnerabilityTrojanBYODFolderShieldPrivacyRootkitSpywareKeyloggerInternetSecurityPayGuardEncryptionPrivacyScannerAPTDataTheftBotAdwareBackdoorInsiderthreatAntivirusMuteModeDeepfakeQuickScanTrendMicroRansomwareBlacklistAuthenticatorExploitDomainCloudWhitehatDDoSHackerPhishingSoftwarePentestingClickjackingVPNVirusHoneypotIPAddressFullScanBreachSecuritySocialEngineeringHomeNetworkSecurityDataProtectionWormBlackhatMaximumSecurityPayGuardMalwareFirewallVulnerabilityTrojanBYODFolderShieldPrivacyRootkitSpywareKeyloggerInternetSecurityPayGuardEncryptionPrivacyScannerAPTDataTheftBotAdwareBackdoorInsiderthreatAntivirusMuteModeDeepfakeQuickScanTrendMicro

SECURITY STARTS WITH ME - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
  1. Ransomware
  2. Blacklist
  3. Authenticator
  4. Exploit
  5. Domain
  6. Cloud
  7. White hat
  8. DDoS
  9. Hacker
  10. Phishing
  11. Software
  12. Pentesting
  13. Clickjacking
  14. VPN
  15. Virus
  16. Honeypot
  17. IP Address
  18. Full Scan
  19. Breach
  20. Security
  21. Social Engineering
  22. Home Network Security
  23. Data Protection
  24. Worm
  25. Black hat
  26. Maximum Security
  27. Pay Guard
  28. Malware
  29. Firewall
  30. Vulnerability
  31. Trojan
  32. BYOD
  33. Folder Shield
  34. Privacy
  35. Rootkit
  36. Spyware
  37. Keylogger
  38. Internet Security
  39. Pay Guard
  40. Encryption
  41. Privacy Scanner
  42. APT
  43. Data Theft
  44. Bot
  45. Adware
  46. Backdoor
  47. Insider threat
  48. Antivirus
  49. Mute Mode
  50. Deepfake
  51. Quick Scan
  52. Trend Micro