Scalability Disaster recovery Ad Hoc Network Firewall Email Ransomware Disruption Remote working Trojan Horse Biometrics Tethering Device hardening Cloud computing Social Engineering Traditional computing Two factor authentication Rural Pharming Cloud storage Industrial espionage Stakeholders Denial of service Internal threats Backup and recovery Bandwidth Infrastructure Anti virus software Downtime Personal Hotspot Open Wifi Network Access Rights Working 24/7/365 Public communication Scalability Disaster recovery Ad Hoc Network Firewall Email Ransomware Disruption Remote working Trojan Horse Biometrics Tethering Device hardening Cloud computing Social Engineering Traditional computing Two factor authentication Rural Pharming Cloud storage Industrial espionage Stakeholders Denial of service Internal threats Backup and recovery Bandwidth Infrastructure Anti virus software Downtime Personal Hotspot Open Wifi Network Access Rights Working 24/7/365 Public communication
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Scalability
Disaster recovery
Ad Hoc Network
Firewall
Email
Ransomware
Disruption
Remote working
Trojan Horse
Biometrics
Tethering
Device hardening
Cloud computing
Social Engineering
Traditional computing
Two factor authentication
Rural
Pharming
Cloud storage
Industrial espionage
Stakeholders
Denial of service
Internal threats
Backup and recovery
Bandwidth
Infrastructure
Anti virus software
Downtime
Personal Hotspot
Open Wifi Network
Access Rights
Working 24/7/365
Public communication