(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
Clickjacking
Banker Trojan
Two-step Authentification
Endpoint ProtectionSpoofing
Ransomware
SIM Swapping
Phishing
Fast Identity Online (FIDO)
Remote Desktop Protocol (RDP)
Cyberbullying
Drive By Download Attack
Zero-day Exploit
Vulnerability
Social Engineering
Honeypot
Firewall
CAPTCHA
PII
CybersecurityScareware
IoT
MalwareVPNBusiness Disruption
In-line Network Device
Secure Socket Layer (SSL)
Keylogger
Attack Vector
Authentication
BYOCIdentity
Threat Assessment
AdwareDDoS
Anti-Virus
Anti-BotnetEncryption
Cryptojacking
Spyware
Spam
Backdoor
Data IntegrityParental Controls
White Hat - Black Hat
Data Breach
Rootkit
Critical InfrastructureSECaaS
Decryption
Data Theft
Risktool
Greylist
Data LossPrevention (DLP)Digital ForensicsSpear Phishing