Protection Malicious Identify Media Fraud Links James Beeson Smishing Minimum Necessary Procedures Safety Information Standard Internet Password Regulation Cyber Risk CIP Phishing Rules Legal Awareness Litigation Suspicious Whaling Email Compliance Social Media Vishing Security Criminal Cyber Security Privacy Guidelines Malware Threat Ransomware Laws Authentication Policies Protection Malicious Identify Media Fraud Links James Beeson Smishing Minimum Necessary Procedures Safety Information Standard Internet Password Regulation Cyber Risk CIP Phishing Rules Legal Awareness Litigation Suspicious Whaling Email Compliance Social Media Vishing Security Criminal Cyber Security Privacy Guidelines Malware Threat Ransomware Laws Authentication Policies
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Protection
Malicious
Identify
Media
Fraud
Links
James Beeson
Smishing
Minimum Necessary
Procedures
Safety
Information
Standard
Internet
Password
Regulation
Cyber Risk
CIP
Phishing
Rules
Legal
Awareness
Litigation
Suspicious
Whaling
Email
Compliance
Social Media
Vishing
Security
Criminal
Cyber Security
Privacy
Guidelines
Malware
Threat
Ransomware
Laws
Authentication
Policies