Trojan Horse Remote working Stakeholders Email Social Engineering Cloud computing Ad Hoc Network Firewall Disruption Downtime Public communication Scalability Industrial espionage Cloud storage Infrastructure Disaster recovery Pharming Device hardening Bandwidth Working 24/7/365 Ransomware Tethering Rural Personal Hotspot Traditional computing Two factor authentication Internal threats Backup and recovery Anti virus software Denial of service Open Wifi Network Access Rights Biometrics Trojan Horse Remote working Stakeholders Email Social Engineering Cloud computing Ad Hoc Network Firewall Disruption Downtime Public communication Scalability Industrial espionage Cloud storage Infrastructure Disaster recovery Pharming Device hardening Bandwidth Working 24/7/365 Ransomware Tethering Rural Personal Hotspot Traditional computing Two factor authentication Internal threats Backup and recovery Anti virus software Denial of service Open Wifi Network Access Rights Biometrics
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Trojan Horse
Remote working
Stakeholders
Email
Social Engineering
Cloud computing
Ad Hoc Network
Firewall
Disruption
Downtime
Public communication
Scalability
Industrial espionage
Cloud storage
Infrastructure
Disaster recovery
Pharming
Device hardening
Bandwidth
Working 24/7/365
Ransomware
Tethering
Rural
Personal Hotspot
Traditional computing
Two factor authentication
Internal threats
Backup and recovery
Anti virus software
Denial of service
Open Wifi Network
Access Rights
Biometrics