SecurityAuditEmailSpoofingEncryptionIncidentResponseZero-DayFirewallMalwarePublicWi-FiRiskAccessControlRansomwareAntivirusDataBreachSecureBackupSecurityAwarenessVPNPatientDataMulti-FactorAuthenticationSocialEngineeringShoulderSurfingSecureLoginRiskAssessmentPasswordManagerTwo-FactorAuthenticationPhishingHIPAASecurityAuditEmailSpoofingEncryptionIncidentResponseZero-DayFirewallMalwarePublicWi-FiRiskAccessControlRansomwareAntivirusDataBreachSecureBackupSecurityAwarenessVPNPatientDataMulti-FactorAuthenticationSocialEngineeringShoulderSurfingSecureLoginRiskAssessmentPasswordManagerTwo-FactorAuthenticationPhishingHIPAA

Breaches and Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Security Audit
  2. Email Spoofing
  3. Encryption
  4. Incident Response
  5. Zero-Day
  6. Firewall
  7. Malware
  8. Public Wi-Fi Risk
  9. Access Control
  10. Ransomware
  11. Antivirus
  12. Data Breach
  13. Secure Backup
  14. Security Awareness
  15. VPN
  16. Patient Data
  17. Multi-Factor Authentication
  18. Social Engineering
  19. Shoulder Surfing
  20. Secure Login
  21. Risk Assessment
  22. Password Manager
  23. Two-Factor Authentication
  24. Phishing
  25. HIPAA