DDoSBlackhatBotSpywareTrendMicroAdwareClickjackingGDPRPrivacyScannerPentestingBYODInsiderthreatWhitehatTrojanAntivirusAuthenticatorUsestrongPasswordSecurityStartswith MeExploitMalwareAvoidusingPublicWiFiSocialEngineeringCCPARansomwareMaximumSecurityVulnerabilityInternetSecurityCheckwebsiteURLCheckNetworkconnectionsRootkitIPAddressBackdoorDataTheftSecurityAPTFolderShieldHackerFullScanCloudBreachBlacklistKeyloggerPrivacyEncryptionClearSearchHistoryBackupyourdataPayGuardDon'tsharepasswordsControlpostcommentsHomeNetworkSecurityPayGuardSoftwarePhishingVirusDataProtectionDeepfakeDomainCyberVigilanceHoneypotQuickScanFirewallVPNWormMuteModeReportSuspiciousEmailDDoSBlackhatBotSpywareTrendMicroAdwareClickjackingGDPRPrivacyScannerPentestingBYODInsiderthreatWhitehatTrojanAntivirusAuthenticatorUsestrongPasswordSecurityStartswith MeExploitMalwareAvoidusingPublicWiFiSocialEngineeringCCPARansomwareMaximumSecurityVulnerabilityInternetSecurityCheckwebsiteURLCheckNetworkconnectionsRootkitIPAddressBackdoorDataTheftSecurityAPTFolderShieldHackerFullScanCloudBreachBlacklistKeyloggerPrivacyEncryptionClearSearchHistoryBackupyourdataPayGuardDon'tsharepasswordsControlpostcommentsHomeNetworkSecurityPayGuardSoftwarePhishingVirusDataProtectionDeepfakeDomainCyberVigilanceHoneypotQuickScanFirewallVPNWormMuteModeReportSuspiciousEmail

SECURITY STARTS WITH ME - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
  1. DDoS
  2. Black hat
  3. Bot
  4. Spyware
  5. Trend Micro
  6. Adware
  7. Clickjacking
  8. GDPR
  9. Privacy Scanner
  10. Pentesting
  11. BYOD
  12. Insider threat
  13. White hat
  14. Trojan
  15. Antivirus
  16. Authenticator
  17. Use strong Password
  18. Security Starts with Me
  19. Exploit
  20. Malware
  21. Avoid using Public WiFi
  22. Social Engineering
  23. CCPA
  24. Ransomware
  25. Maximum Security
  26. Vulnerability
  27. Internet Security
  28. Check website URL
  29. Check Network connections
  30. Rootkit
  31. IP Address
  32. Backdoor
  33. Data Theft
  34. Security
  35. APT
  36. Folder Shield
  37. Hacker
  38. Full Scan
  39. Cloud
  40. Breach
  41. Blacklist
  42. Keylogger
  43. Privacy
  44. Encryption
  45. Clear Search History
  46. Backup your data
  47. Pay Guard
  48. Don't share passwords
  49. Control post comments
  50. Home Network Security
  51. Pay Guard
  52. Software
  53. Phishing
  54. Virus
  55. Data Protection
  56. Deepfake
  57. Domain
  58. Cyber Vigilance
  59. Honeypot
  60. Quick Scan
  61. Firewall
  62. VPN
  63. Worm
  64. Mute Mode
  65. Report Suspicious Email