vulnerabilitylockoutcompromisesecurityPhishingWormcookiesThreatLandscapepaymentoptionaccountability12charactersdatabaseVirusSLAAccessControlPolicyThreatNetworksGuidelinesGDPRinformationclassificationstandardsdigitaldataPretexting80/20SDLCsecurityawarenessBYODSocialEngineeringPolicyProceduresdataprivacyCybersecurityLandscapedatabackupPIITrojanInternalUseconfidentialMFAPhishingSensitiveBreachrestrictedinformationsystemsserverPasswordScamVulnerabilityInformationSecuritydatasecuritycriticalfilesVishingRansomwareStandardsAccessControlSpearPhishinglockoutDPARiskSmishingSocialMediaScamsvulnerabilitylockoutcompromisesecurityPhishingWormcookiesThreatLandscapepaymentoptionaccountability12charactersdatabaseVirusSLAAccessControlPolicyThreatNetworksGuidelinesGDPRinformationclassificationstandardsdigitaldataPretexting80/20SDLCsecurityawarenessBYODSocialEngineeringPolicyProceduresdataprivacyCybersecurityLandscapedatabackupPIITrojanInternalUseconfidentialMFAPhishingSensitiveBreachrestrictedinformationsystemsserverPasswordScamVulnerabilityInformationSecuritydatasecuritycriticalfilesVishingRansomwareStandardsAccessControlSpearPhishinglockoutDPARiskSmishingSocialMediaScams

APN SAT 2024 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
  1. vulnerability
  2. lockout
  3. compromise
  4. security
  5. Phishing
  6. Worm
  7. cookies
  8. Threat Landscape
  9. payment option
  10. accountability
  11. 12 characters
  12. database
  13. Virus
  14. SLA
  15. Access Control Policy
  16. Threat
  17. Networks
  18. Guidelines
  19. GDPR
  20. information classification standards
  21. digital data
  22. Pretexting
  23. 80/20
  24. SDLC
  25. security awareness
  26. BYOD
  27. Social Engineering
  28. Policy
  29. Procedures
  30. data privacy
  31. Cybersecurity Landscape
  32. data
  33. backup
  34. PII
  35. Trojan
  36. Internal Use
  37. confidential
  38. MFA
  39. Phishing
  40. Sensitive
  41. Breach
  42. restricted
  43. information systems
  44. server
  45. Password
  46. Scam
  47. Vulnerability
  48. Information Security
  49. data security
  50. critical files
  51. Vishing
  52. Ransomware
  53. Standards
  54. Access Control
  55. Spear Phishing
  56. lockout
  57. DPA
  58. Risk
  59. Smishing
  60. Social Media Scams