TrendMicroCheckNetworkconnectionsUsestrongPasswordWhitehatDomainHoneypotMaximumSecuritySocialEngineeringFolderShieldClearSearchHistoryRootkitAuthenticatorBlacklistDDoSBreachCyberVigilanceDeepfakeQuickScanClickjackingReportSuspiciousEmailWormFullScanDon'tsharepasswordsBYODCloudVPNAvoidusingPublicWiFiPentestingPayGuardVirusSpywareDataTheftGDPRAPTSecurityFirewallBotSecurityStartswith MeSoftwareBlackhatPrivacyMuteModeCheckwebsiteURLAdwareBackdoorHomeNetworkSecurityVulnerabilityControlpostcommentsIPAddressTrojanEncryptionDataProtectionAntivirusHackerPhishingMalwareCCPARansomwarePayGuardPrivacyScannerInsiderthreatBackupyourdataExploitKeyloggerInternetSecurityTrendMicroCheckNetworkconnectionsUsestrongPasswordWhitehatDomainHoneypotMaximumSecuritySocialEngineeringFolderShieldClearSearchHistoryRootkitAuthenticatorBlacklistDDoSBreachCyberVigilanceDeepfakeQuickScanClickjackingReportSuspiciousEmailWormFullScanDon'tsharepasswordsBYODCloudVPNAvoidusingPublicWiFiPentestingPayGuardVirusSpywareDataTheftGDPRAPTSecurityFirewallBotSecurityStartswith MeSoftwareBlackhatPrivacyMuteModeCheckwebsiteURLAdwareBackdoorHomeNetworkSecurityVulnerabilityControlpostcommentsIPAddressTrojanEncryptionDataProtectionAntivirusHackerPhishingMalwareCCPARansomwarePayGuardPrivacyScannerInsiderthreatBackupyourdataExploitKeyloggerInternetSecurity

SECURITY STARTS WITH ME - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
  1. Trend Micro
  2. Check Network connections
  3. Use strong Password
  4. White hat
  5. Domain
  6. Honeypot
  7. Maximum Security
  8. Social Engineering
  9. Folder Shield
  10. Clear Search History
  11. Rootkit
  12. Authenticator
  13. Blacklist
  14. DDoS
  15. Breach
  16. Cyber Vigilance
  17. Deepfake
  18. Quick Scan
  19. Clickjacking
  20. Report Suspicious Email
  21. Worm
  22. Full Scan
  23. Don't share passwords
  24. BYOD
  25. Cloud
  26. VPN
  27. Avoid using Public WiFi
  28. Pentesting
  29. Pay Guard
  30. Virus
  31. Spyware
  32. Data Theft
  33. GDPR
  34. APT
  35. Security
  36. Firewall
  37. Bot
  38. Security Starts with Me
  39. Software
  40. Black hat
  41. Privacy
  42. Mute Mode
  43. Check website URL
  44. Adware
  45. Backdoor
  46. Home Network Security
  47. Vulnerability
  48. Control post comments
  49. IP Address
  50. Trojan
  51. Encryption
  52. Data Protection
  53. Antivirus
  54. Hacker
  55. Phishing
  56. Malware
  57. CCPA
  58. Ransomware
  59. Pay Guard
  60. Privacy Scanner
  61. Insider threat
  62. Backup your data
  63. Exploit
  64. Keylogger
  65. Internet Security