MaximumSecurityBotTrendMicroInternetSecurityDataProtectionDon'tsharepasswordsVulnerabilityPayGuardDeepfakeRansomwareSecurityStartswith MeMalwareSocialEngineeringHomeNetworkSecurityBackdoorClickjackingPrivacyTrojanPhishingBackupyourdataCheckNetworkconnectionsVirusDomainClearSearchHistoryMuteModeFullScanFirewallBlackhatHoneypotAdwareIPAddressSoftwareAuthenticatorVPNWormExploitUsestrongPasswordQuickScanInsiderthreatBlacklistAvoidusingPublicWiFiPrivacyScannerPentestingCyberVigilanceBreachCCPAWhitehatEncryptionHackerAntivirusGDPRAPTDDoSBYODKeyloggerControlpostcommentsReportSuspiciousEmailSpywareCloudPayGuardSecurityDataTheftCheckwebsiteURLFolderShieldRootkitMaximumSecurityBotTrendMicroInternetSecurityDataProtectionDon'tsharepasswordsVulnerabilityPayGuardDeepfakeRansomwareSecurityStartswith MeMalwareSocialEngineeringHomeNetworkSecurityBackdoorClickjackingPrivacyTrojanPhishingBackupyourdataCheckNetworkconnectionsVirusDomainClearSearchHistoryMuteModeFullScanFirewallBlackhatHoneypotAdwareIPAddressSoftwareAuthenticatorVPNWormExploitUsestrongPasswordQuickScanInsiderthreatBlacklistAvoidusingPublicWiFiPrivacyScannerPentestingCyberVigilanceBreachCCPAWhitehatEncryptionHackerAntivirusGDPRAPTDDoSBYODKeyloggerControlpostcommentsReportSuspiciousEmailSpywareCloudPayGuardSecurityDataTheftCheckwebsiteURLFolderShieldRootkit

SECURITY STARTS WITH ME - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
  1. Maximum Security
  2. Bot
  3. Trend Micro
  4. Internet Security
  5. Data Protection
  6. Don't share passwords
  7. Vulnerability
  8. Pay Guard
  9. Deepfake
  10. Ransomware
  11. Security Starts with Me
  12. Malware
  13. Social Engineering
  14. Home Network Security
  15. Backdoor
  16. Clickjacking
  17. Privacy
  18. Trojan
  19. Phishing
  20. Backup your data
  21. Check Network connections
  22. Virus
  23. Domain
  24. Clear Search History
  25. Mute Mode
  26. Full Scan
  27. Firewall
  28. Black hat
  29. Honeypot
  30. Adware
  31. IP Address
  32. Software
  33. Authenticator
  34. VPN
  35. Worm
  36. Exploit
  37. Use strong Password
  38. Quick Scan
  39. Insider threat
  40. Blacklist
  41. Avoid using Public WiFi
  42. Privacy Scanner
  43. Pentesting
  44. Cyber Vigilance
  45. Breach
  46. CCPA
  47. White hat
  48. Encryption
  49. Hacker
  50. Antivirus
  51. GDPR
  52. APT
  53. DDoS
  54. BYOD
  55. Keylogger
  56. Control post comments
  57. Report Suspicious Email
  58. Spyware
  59. Cloud
  60. Pay Guard
  61. Security
  62. Data Theft
  63. Check website URL
  64. Folder Shield
  65. Rootkit