smishing Firewall Respond Spear Phishing Types of Hackers Least Privilege Secure Email Detect Asset Management spearphishing Zero Day PassPhase Identify Secure Password Recover Security Awareness Training Advanced Persistent Threat Vishing Data Discovery Whaling Two-Factor Authentication Patch Management SSL Decrypt Antivirus VPN Malware Risk Assessment Protect Phishing smishing Firewall Respond Spear Phishing Types of Hackers Least Privilege Secure Email Detect Asset Management spearphishing Zero Day PassPhase Identify Secure Password Recover Security Awareness Training Advanced Persistent Threat Vishing Data Discovery Whaling Two-Factor Authentication Patch Management SSL Decrypt Antivirus VPN Malware Risk Assessment Protect Phishing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
smishing
Firewall
Respond
Spear Phishing
Types of Hackers
Least Privilege
Secure Email
Detect
Asset Management
spearphishing
Zero Day
PassPhase
Identify
Secure Password
Recover
Security Awareness Training
Advanced Persistent Threat
Vishing
Data Discovery
Whaling
Two-Factor Authentication
Patch Management
SSL Decrypt
Antivirus
VPN
Malware
Risk Assessment
Protect
Phishing