MalWareAttackDataBackupRole-BasedAccessControlScareWareRemovableMediaStrongPasswordsRiskAssessmentTechnicalSafeguardsCredentials/PasswordsPhishingIDBadgeEncryptionNotifyIT2 FactorAuthenticationSecurityOfficerSLAMScreenSavereMARSyncAdministrativeSafeguardsPhysicalSafeguardsAnti-VirusExpectationof PrivacyRansomwareAttackPhysicalAccessControlsIncidentsNotRememberSocialEngineeringMalWareSecureyourscreenSaySomethingWorkstationSecurityCryptojackingMobileDevicesMalWareAttackDataBackupRole-BasedAccessControlScareWareRemovableMediaStrongPasswordsRiskAssessmentTechnicalSafeguardsCredentials/PasswordsPhishingIDBadgeEncryptionNotifyIT2 FactorAuthenticationSecurityOfficerSLAMScreenSavereMARSyncAdministrativeSafeguardsPhysicalSafeguardsAnti-VirusExpectationof PrivacyRansomwareAttackPhysicalAccessControlsIncidentsNotRememberSocialEngineeringMalWareSecureyourscreenSaySomethingWorkstationSecurityCryptojackingMobileDevices

HIPAA Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
  1. MalWare Attack
  2. Data Backup
  3. Role-Based Access Control
  4. ScareWare
  5. Removable Media
  6. Strong Passwords
  7. Risk Assessment
  8. Technical Safeguards
  9. Credentials /Passwords
  10. Phishing
  11. ID Badge
  12. Encryption
  13. Notify IT
  14. 2 Factor Authentication
  15. Security Officer
  16. SLAM
  17. Screen Saver
  18. eMAR
  19. Sync
  20. Administrative Safeguards
  21. Physical Safeguards
  22. Anti-Virus
  23. Expectation of Privacy
  24. Ransomware Attack
  25. Physical Access Controls
  26. Incidents
  27. Not Remember
  28. Social Engineering
  29. MalWare
  30. Secure your screen
  31. Say Something
  32. Workstation Security
  33. Cryptojacking
  34. Mobile Devices