Firewall Email Stakeholders Working 24/7/365 Backup and recovery Social Engineering Industrial espionage Traditional computing Bandwidth Disruption Two factor authentication Trojan Horse Ad Hoc Network Device hardening Remote working Ransomware Personal Hotspot Tethering Cloud storage Open Wifi Network Biometrics Scalability Disaster recovery Access Rights Public communication Cloud computing Downtime Pharming Internal threats Infrastructure Anti virus software Rural Denial of service Firewall Email Stakeholders Working 24/7/365 Backup and recovery Social Engineering Industrial espionage Traditional computing Bandwidth Disruption Two factor authentication Trojan Horse Ad Hoc Network Device hardening Remote working Ransomware Personal Hotspot Tethering Cloud storage Open Wifi Network Biometrics Scalability Disaster recovery Access Rights Public communication Cloud computing Downtime Pharming Internal threats Infrastructure Anti virus software Rural Denial of service
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Firewall
Email
Stakeholders
Working 24/7/365
Backup and recovery
Social Engineering
Industrial espionage
Traditional computing
Bandwidth
Disruption
Two factor authentication
Trojan Horse
Ad Hoc Network
Device hardening
Remote working
Ransomware
Personal Hotspot
Tethering
Cloud storage
Open Wifi Network
Biometrics
Scalability
Disaster recovery
Access Rights
Public communication
Cloud computing
Downtime
Pharming
Internal threats
Infrastructure
Anti virus software
Rural
Denial of service