(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
Think Before You Click
GIZMO
Unauthorized access or exposure of sensitive data, often resulting in harm
Data Breach
A form of identity theft in which a transaction, typically financial, is performed using the stolen identity of another individual. The fraud is due to the attacker impersonating someone else.
Identity Fraud
The process of converting data into a code to prevent unauthorized access.
HACKER
The process of verifying the identity of a user or system.
Authentication
The Grinch Slays
How the Grinch STOLE Christmas
Even NOOB's THINK BEFORE They CLICK
The practice of securing computer networks and their infrastructure.
Cybersecurity
A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP. Most SPAM is advertising, but some may include malicious code, malicious hyperlinks or
SPAM
A plan for addressing and mitigating cybersecurity incidents.
A security system that protects web applications from various online threats. And monitors and filters incoming and outgoing network traffic.
Firewall
Creating copies of data to ensure it can be restored in case of data loss.
Backup
A secure and encrypted connection between a user's computer and a remote server.
VPN
GRINCH
CANDY CANE
A method of attempting to acquire sensitive information through deceptive emails.
Phishing
GIFTS
ISP (Internet Service Provider)
The organization that provides connectivity to the Internet for individuals or companies. Some ISPs offer additional services above that of just connectivity such as e-mail, web hosting and domain registration.
ISP
A security process in which users provide two different authentication factors.
Two Factor Authentication
Internet Safety
NOOB
Ransomware: Malicious software that encrypts files and demands a ransom for their release.
Ransomware
A set of rules and guidelines for maintaining security within an organization.
Security Policy
Don't Let Your Data Get GRINCHED
Ransomware: Malicious software that encrypts files and demands a ransom for their release.
MAX
Happy Holidays from DCI
Software designed to detect, prevent, and remove malicious software from a computer.
Antivirus
Manipulating individuals to disclose sensitive information or perform actions.
Social Engineering
Authorized testing and probing of computer systems for security vulnerabilities.
Ethical Hacking
Think before you act!
A system that restricts and manages access to certain resources or areas.
Access Control
The evaluation of potential risks and vulnerabilities in a system.
Risk Assessment
The process of converting data into a code to prevent unauthorized access.
Encryption
CINDY LOU
The practice of securing computer networks and their infrastructure.
Software designed to harm or exploit computer systems and data.
Malware
Secure your passwords.
A system that identifies and responds to unauthorized access to a network.
Intrusion Detection System
A trap or decoy for attackers. A honeypot is used to distract attackers in order to prevent them from attacking actual production systems.
Honeypot
A means to support network communication using radio waves rather than cables. The current Wi-Fi or wireless networking technologies are based on the IEE 802.11 standard and its numerous amendments, which address speed, frequency, authentication
Wi-Fi