(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
N-Imposter Scams
I-Updating Pro Tips
O-Holiday Shopping Scam
N-Passwords, Managers, and MFA
B-Securing Your Computer From Eavesdropping
B-Online Tracking
G-Charity Scams
I- Credential Stuffing Attacks
I-IoT and Smart Devices
G-Fitness Scams
I-Cyber Incident Prep Part 1
G-MFA Fatigue Attacks
B-Attack Surfaces: Physical and Digital
O-Brute Force Attacks
I-Transportation Scams
N-Marketplace Scams
N-QR Code Phishing
B-How to Keep Your Bluetooth Happy
O-Securing Your Mobile Device from Eavesdropping
B-Recognizing and Reporting Phishing
O-The Cyber Twilight Zone
O-Display Name Scams
G-Securing Your Smart Home and IOT Devices From Eavesdropping