FirewallExploitHoneypotCheckNetworkconnectionsTrojanRansomwareMaximumSecuritySecurityWhitehatInternetSecurityWormClickjackingBreachPentestingKeyloggerPayGuardVirusFullScanPayGuardDeepfakeMalwareControlpostcommentsSecurityStartswith MeHackerGDPRAvoidusingPublicWiFiCheckwebsiteURLIPAddressCCPABYODHomeNetworkSecurityCyberVigilanceBlackhatInsiderthreatBotFolderShieldTrendMicroUsestrongPasswordClearSearchHistoryCloudVPNSocialEngineeringBackdoorEncryptionPrivacyDomainDataTheftReportSuspiciousEmailDon'tsharepasswordsVulnerabilityPhishingQuickScanBlacklistRootkitAPTSoftwareDDoSDataProtectionSpywareMuteModeAuthenticatorAntivirusAdwarePrivacyScannerBackupyourdataFirewallExploitHoneypotCheckNetworkconnectionsTrojanRansomwareMaximumSecuritySecurityWhitehatInternetSecurityWormClickjackingBreachPentestingKeyloggerPayGuardVirusFullScanPayGuardDeepfakeMalwareControlpostcommentsSecurityStartswith MeHackerGDPRAvoidusingPublicWiFiCheckwebsiteURLIPAddressCCPABYODHomeNetworkSecurityCyberVigilanceBlackhatInsiderthreatBotFolderShieldTrendMicroUsestrongPasswordClearSearchHistoryCloudVPNSocialEngineeringBackdoorEncryptionPrivacyDomainDataTheftReportSuspiciousEmailDon'tsharepasswordsVulnerabilityPhishingQuickScanBlacklistRootkitAPTSoftwareDDoSDataProtectionSpywareMuteModeAuthenticatorAntivirusAdwarePrivacyScannerBackupyourdata

SECURITY STARTS WITH ME - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
  1. Firewall
  2. Exploit
  3. Honeypot
  4. Check Network connections
  5. Trojan
  6. Ransomware
  7. Maximum Security
  8. Security
  9. White hat
  10. Internet Security
  11. Worm
  12. Clickjacking
  13. Breach
  14. Pentesting
  15. Keylogger
  16. Pay Guard
  17. Virus
  18. Full Scan
  19. Pay Guard
  20. Deepfake
  21. Malware
  22. Control post comments
  23. Security Starts with Me
  24. Hacker
  25. GDPR
  26. Avoid using Public WiFi
  27. Check website URL
  28. IP Address
  29. CCPA
  30. BYOD
  31. Home Network Security
  32. Cyber Vigilance
  33. Black hat
  34. Insider threat
  35. Bot
  36. Folder Shield
  37. Trend Micro
  38. Use strong Password
  39. Clear Search History
  40. Cloud
  41. VPN
  42. Social Engineering
  43. Backdoor
  44. Encryption
  45. Privacy
  46. Domain
  47. Data Theft
  48. Report Suspicious Email
  49. Don't share passwords
  50. Vulnerability
  51. Phishing
  52. Quick Scan
  53. Blacklist
  54. Rootkit
  55. APT
  56. Software
  57. DDoS
  58. Data Protection
  59. Spyware
  60. Mute Mode
  61. Authenticator
  62. Antivirus
  63. Adware
  64. Privacy Scanner
  65. Backup your data