GDPRBreachAdwareDDoSPrivacyScannerPhishingControlpostcommentsRootkitVirusCyberVigilanceCloudDataTheftVPNSpywareUsestrongPasswordPrivacyTrendMicroHackerDataProtectionBackdoorFirewallExploitBlackhatDon'tsharepasswordsWhitehatFullScanAntivirusBotClearSearchHistoryMalwareSoftwareSecurityAuthenticatorSecurityStartswith MeDeepfakeAvoidusingPublicWiFiCheckwebsiteURLDomainBackupyourdataBlacklistAPTMaximumSecurityClickjackingPayGuardPentestingTrojanHomeNetworkSecuritySocialEngineeringVulnerabilityReportSuspiciousEmailRansomwareBYODInsiderthreatWormCCPAHoneypotCheckNetworkconnectionsKeyloggerMuteModeEncryptionIPAddressPayGuardInternetSecurityFolderShieldQuickScanGDPRBreachAdwareDDoSPrivacyScannerPhishingControlpostcommentsRootkitVirusCyberVigilanceCloudDataTheftVPNSpywareUsestrongPasswordPrivacyTrendMicroHackerDataProtectionBackdoorFirewallExploitBlackhatDon'tsharepasswordsWhitehatFullScanAntivirusBotClearSearchHistoryMalwareSoftwareSecurityAuthenticatorSecurityStartswith MeDeepfakeAvoidusingPublicWiFiCheckwebsiteURLDomainBackupyourdataBlacklistAPTMaximumSecurityClickjackingPayGuardPentestingTrojanHomeNetworkSecuritySocialEngineeringVulnerabilityReportSuspiciousEmailRansomwareBYODInsiderthreatWormCCPAHoneypotCheckNetworkconnectionsKeyloggerMuteModeEncryptionIPAddressPayGuardInternetSecurityFolderShieldQuickScan

SECURITY STARTS WITH ME - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
  1. GDPR
  2. Breach
  3. Adware
  4. DDoS
  5. Privacy Scanner
  6. Phishing
  7. Control post comments
  8. Rootkit
  9. Virus
  10. Cyber Vigilance
  11. Cloud
  12. Data Theft
  13. VPN
  14. Spyware
  15. Use strong Password
  16. Privacy
  17. Trend Micro
  18. Hacker
  19. Data Protection
  20. Backdoor
  21. Firewall
  22. Exploit
  23. Black hat
  24. Don't share passwords
  25. White hat
  26. Full Scan
  27. Antivirus
  28. Bot
  29. Clear Search History
  30. Malware
  31. Software
  32. Security
  33. Authenticator
  34. Security Starts with Me
  35. Deepfake
  36. Avoid using Public WiFi
  37. Check website URL
  38. Domain
  39. Backup your data
  40. Blacklist
  41. APT
  42. Maximum Security
  43. Clickjacking
  44. Pay Guard
  45. Pentesting
  46. Trojan
  47. Home Network Security
  48. Social Engineering
  49. Vulnerability
  50. Report Suspicious Email
  51. Ransomware
  52. BYOD
  53. Insider threat
  54. Worm
  55. CCPA
  56. Honeypot
  57. Check Network connections
  58. Keylogger
  59. Mute Mode
  60. Encryption
  61. IP Address
  62. Pay Guard
  63. Internet Security
  64. Folder Shield
  65. Quick Scan