(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
Malvertising
Hacker
Cyberbullying
SIM Swapping
Greylist
Business Continuity Plan
AdwareDDoS
Ransomware
MalwareVPNBusiness Disruption
Clickjacking
Whitelist, Allowlist
Honeypot
BYOD
Risktool
Zero-day Exploit
Clientless
Banker Trojan
Dark Web
In-line Network Device
BYOCIdentity
Phishing
Fast Identity Online (FIDO)
Vulnerability
Firewall
Cryptojacking
IoT
BYOL
Rootkit
Anti-BotnetEncryption
Anti-Virus
Attack Vector
CybersecurityScareware
Remote Desktop Protocol (RDP)
Anti-Malware
Secure Socket Layer (SSL)
Process Hollowing
Sandbox(ing)
Two-step Authentification
Decryption
Data Breach
Threat Intelligence
Insider Threat
Spam
Virus
WAFMan-in-theMiddle Attack
Keylogger
Botnet
Authentication
Backdoor
Data LossPrevention (DLP)Digital ForensicsSpear Phishing