SecurityVirusQuickScanDDoSHoneypotDataTheftWhitehatFolderShieldPayGuardHomeNetworkSecurityEncryptionBackdoorSoftwareDeepfakeVulnerabilityRansomwarePrivacyScannerFirewallTrojanWormPentestingAPTAntivirusIPAddressAdwareVPNDomainCloudClickjackingBlacklistTrendMicroInternetSecurityRootkitBotPhishingMaximumSecuritySocialEngineeringHackerBreachMalwarePrivacyFullScanPayGuardKeyloggerSpywareExploitBlackhatDataProtectionInsiderthreatBYODAuthenticatorMuteModeSecurityVirusQuickScanDDoSHoneypotDataTheftWhitehatFolderShieldPayGuardHomeNetworkSecurityEncryptionBackdoorSoftwareDeepfakeVulnerabilityRansomwarePrivacyScannerFirewallTrojanWormPentestingAPTAntivirusIPAddressAdwareVPNDomainCloudClickjackingBlacklistTrendMicroInternetSecurityRootkitBotPhishingMaximumSecuritySocialEngineeringHackerBreachMalwarePrivacyFullScanPayGuardKeyloggerSpywareExploitBlackhatDataProtectionInsiderthreatBYODAuthenticatorMuteMode

SECURITY STARTS WITH ME - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
  1. Security
  2. Virus
  3. Quick Scan
  4. DDoS
  5. Honeypot
  6. Data Theft
  7. White hat
  8. Folder Shield
  9. Pay Guard
  10. Home Network Security
  11. Encryption
  12. Backdoor
  13. Software
  14. Deepfake
  15. Vulnerability
  16. Ransomware
  17. Privacy Scanner
  18. Firewall
  19. Trojan
  20. Worm
  21. Pentesting
  22. APT
  23. Antivirus
  24. IP Address
  25. Adware
  26. VPN
  27. Domain
  28. Cloud
  29. Clickjacking
  30. Blacklist
  31. Trend Micro
  32. Internet Security
  33. Rootkit
  34. Bot
  35. Phishing
  36. Maximum Security
  37. Social Engineering
  38. Hacker
  39. Breach
  40. Malware
  41. Privacy
  42. Full Scan
  43. Pay Guard
  44. Keylogger
  45. Spyware
  46. Exploit
  47. Black hat
  48. Data Protection
  49. Insider threat
  50. BYOD
  51. Authenticator
  52. Mute Mode