Laws CIP Smishing Security Media Vishing Procedures Information Awareness Threat Safety Rules Email Protection Policies Cyber Security Whaling Authentication Identify Legal James Beeson Password Internet Social Media Links Regulation Phishing Privacy Cyber Risk Litigation Compliance Malicious Fraud Criminal Malware Standard Ransomware Guidelines Minimum Necessary Suspicious Laws CIP Smishing Security Media Vishing Procedures Information Awareness Threat Safety Rules Email Protection Policies Cyber Security Whaling Authentication Identify Legal James Beeson Password Internet Social Media Links Regulation Phishing Privacy Cyber Risk Litigation Compliance Malicious Fraud Criminal Malware Standard Ransomware Guidelines Minimum Necessary Suspicious
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Laws
CIP
Smishing
Security
Media
Vishing
Procedures
Information
Awareness
Threat
Safety
Rules
Email
Protection
Policies
Cyber Security
Whaling
Authentication
Identify
Legal
James Beeson
Password
Internet
Social Media
Links
Regulation
Phishing
Privacy
Cyber Risk
Litigation
Compliance
Malicious
Fraud
Criminal
Malware
Standard
Ransomware
Guidelines
Minimum Necessary
Suspicious