Security Safety Procedures Laws Regulation Rules Legal Guidelines Awareness Vishing Links Minimum Necessary Litigation Identify Smishing Cyber Security Suspicious Malware Internet James Beeson Privacy Cyber Risk Media Authentication Password Protection Malicious Whaling Social Media Compliance CIP Email Phishing Policies Ransomware Fraud Criminal Standard Threat Information Security Safety Procedures Laws Regulation Rules Legal Guidelines Awareness Vishing Links Minimum Necessary Litigation Identify Smishing Cyber Security Suspicious Malware Internet James Beeson Privacy Cyber Risk Media Authentication Password Protection Malicious Whaling Social Media Compliance CIP Email Phishing Policies Ransomware Fraud Criminal Standard Threat Information
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Security
Safety
Procedures
Laws
Regulation
Rules
Legal
Guidelines
Awareness
Vishing
Links
Minimum Necessary
Litigation
Identify
Smishing
Cyber Security
Suspicious
Malware
Internet
James Beeson
Privacy
Cyber Risk
Media
Authentication
Password
Protection
Malicious
Whaling
Social Media
Compliance
CIP
Email
Phishing
Policies
Ransomware
Fraud
Criminal
Standard
Threat
Information