(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
SIM Swapping
Insider Threat
Anti-Malware
Greylist
Data Theft
Honeypot
Spyware
Phishing
Hacker
Malvertising
Anti-Phishing
White Hat - Black Hat
Rootkit
Endpoint ProtectionSpoofing
Anti-Virus
Threat Hunting
Data IntegrityParental Controls
Ransomware
Data Breach
CybersecurityScareware
Two-step Authentification
Zero-day Exploit
Risktool
Whitelist, Allowlist
Sandbox(ing)
BYOL
In-line Network Device
Firewall
Cryptojacking
Decryption
Digital Transformation
BYOD
Patch
Anti-BotnetEncryption
Botnet
Process Hollowing
Business Continuity Plan
Virus
Data LossPrevention (DLP)Digital ForensicsSpear Phishing