Scalability Backup and recovery Open Wifi Network Rural Device hardening Access Rights Cloud storage Two factor authentication Traditional computing Bandwidth Ad Hoc Network Anti virus software Personal Hotspot Infrastructure Working 24/7/365 Social Engineering Disaster recovery Disruption Industrial espionage Public communication Biometrics Cloud computing Denial of service Email Internal threats Firewall Ransomware Tethering Remote working Downtime Trojan Horse Pharming Stakeholders Scalability Backup and recovery Open Wifi Network Rural Device hardening Access Rights Cloud storage Two factor authentication Traditional computing Bandwidth Ad Hoc Network Anti virus software Personal Hotspot Infrastructure Working 24/7/365 Social Engineering Disaster recovery Disruption Industrial espionage Public communication Biometrics Cloud computing Denial of service Email Internal threats Firewall Ransomware Tethering Remote working Downtime Trojan Horse Pharming Stakeholders
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Scalability
Backup and recovery
Open Wifi Network
Rural
Device hardening
Access Rights
Cloud storage
Two factor authentication
Traditional computing
Bandwidth
Ad Hoc Network
Anti virus software
Personal Hotspot
Infrastructure
Working 24/7/365
Social Engineering
Disaster recovery
Disruption
Industrial espionage
Public communication
Biometrics
Cloud computing
Denial of service
Email
Internal threats
Firewall
Ransomware
Tethering
Remote working
Downtime
Trojan Horse
Pharming
Stakeholders