(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
Patch
BYOD
Phishing
PII
Rootkit
Spam
Attack Vector
Authentication
Firewall
Sandbox(ing)
Two-step Authentification
Security Incident Response
Data Breach
CybersecurityScareware
BYOL
BYOCIdentity
Banker Trojan
Cyberbullying
Data Theft
Critical InfrastructureSECaaS
Cryptojacking
CAPTCHA
Endpoint ProtectionSpoofing
Vulnerability
Honeypot
Malvertising
WAFMan-in-theMiddle Attack
Backdoor
Anti-Virus
Ransomware
White Hat - Black Hat
Decryption
Whitelist, Allowlist
Fileless Malware
Spyware
Threat Hunting
Anti-Malware
Exploit
Business Continuity Plan
Brute Force Attack
Virus
Digital Transformation
In-line Network Device
MalwareVPNBusiness Disruption
Hacker
IoT
Remote Desktop Protocol (RDP)
AdwareDDoS
Anti-Phishing
Botnet
Data LossPrevention (DLP)Digital ForensicsSpear Phishing