HoneypotExploitAPTBackdoorSpywareQuickScanBlacklistAdwareSecurityMalwareClickjackingFullScanCheckwebsiteURLSecurityStartswith MeInsiderthreatClearSearchHistoryCloudPayGuardCCPAPhishingVPNDon'tsharepasswordsRootkitVirusDomainAuthenticatorDeepfakeSocialEngineeringEncryptionPrivacyScannerPrivacySoftwareInternetSecurityFolderShieldDataTheftPentestingHomeNetworkSecurityDDoSBreachCheckNetworkconnectionsVulnerabilityWormKeyloggerRansomwareBYODBackupyourdataPayGuardMuteModeTrendMicroUsestrongPasswordAvoidusingPublicWiFiReportSuspiciousEmailBlackhatTrojanIPAddressDataProtectionAntivirusCyberVigilanceHackerGDPRMaximumSecurityFirewallBotControlpostcommentsWhitehatHoneypotExploitAPTBackdoorSpywareQuickScanBlacklistAdwareSecurityMalwareClickjackingFullScanCheckwebsiteURLSecurityStartswith MeInsiderthreatClearSearchHistoryCloudPayGuardCCPAPhishingVPNDon'tsharepasswordsRootkitVirusDomainAuthenticatorDeepfakeSocialEngineeringEncryptionPrivacyScannerPrivacySoftwareInternetSecurityFolderShieldDataTheftPentestingHomeNetworkSecurityDDoSBreachCheckNetworkconnectionsVulnerabilityWormKeyloggerRansomwareBYODBackupyourdataPayGuardMuteModeTrendMicroUsestrongPasswordAvoidusingPublicWiFiReportSuspiciousEmailBlackhatTrojanIPAddressDataProtectionAntivirusCyberVigilanceHackerGDPRMaximumSecurityFirewallBotControlpostcommentsWhitehat

SECURITY STARTS WITH ME - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
  1. Honeypot
  2. Exploit
  3. APT
  4. Backdoor
  5. Spyware
  6. Quick Scan
  7. Blacklist
  8. Adware
  9. Security
  10. Malware
  11. Clickjacking
  12. Full Scan
  13. Check website URL
  14. Security Starts with Me
  15. Insider threat
  16. Clear Search History
  17. Cloud
  18. Pay Guard
  19. CCPA
  20. Phishing
  21. VPN
  22. Don't share passwords
  23. Rootkit
  24. Virus
  25. Domain
  26. Authenticator
  27. Deepfake
  28. Social Engineering
  29. Encryption
  30. Privacy Scanner
  31. Privacy
  32. Software
  33. Internet Security
  34. Folder Shield
  35. Data Theft
  36. Pentesting
  37. Home Network Security
  38. DDoS
  39. Breach
  40. Check Network connections
  41. Vulnerability
  42. Worm
  43. Keylogger
  44. Ransomware
  45. BYOD
  46. Backup your data
  47. Pay Guard
  48. Mute Mode
  49. Trend Micro
  50. Use strong Password
  51. Avoid using Public WiFi
  52. Report Suspicious Email
  53. Black hat
  54. Trojan
  55. IP Address
  56. Data Protection
  57. Antivirus
  58. Cyber Vigilance
  59. Hacker
  60. GDPR
  61. Maximum Security
  62. Firewall
  63. Bot
  64. Control post comments
  65. White hat