SocialEngineeringEncryptionAccessControlRansomwarePatientDataPasswordManagerAntivirusPublicWi-FiRiskShoulderSurfingSecurityAuditDataBreachMalwareMulti-FactorAuthenticationSecureBackupZero-DayFirewallHIPAATwo-FactorAuthenticationRiskAssessmentVPNEmailSpoofingIncidentResponseSecureLoginSecurityAwarenessPhishingSocialEngineeringEncryptionAccessControlRansomwarePatientDataPasswordManagerAntivirusPublicWi-FiRiskShoulderSurfingSecurityAuditDataBreachMalwareMulti-FactorAuthenticationSecureBackupZero-DayFirewallHIPAATwo-FactorAuthenticationRiskAssessmentVPNEmailSpoofingIncidentResponseSecureLoginSecurityAwarenessPhishing

Breaches and Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Social Engineering
  2. Encryption
  3. Access Control
  4. Ransomware
  5. Patient Data
  6. Password Manager
  7. Antivirus
  8. Public Wi-Fi Risk
  9. Shoulder Surfing
  10. Security Audit
  11. Data Breach
  12. Malware
  13. Multi-Factor Authentication
  14. Secure Backup
  15. Zero-Day
  16. Firewall
  17. HIPAA
  18. Two-Factor Authentication
  19. Risk Assessment
  20. VPN
  21. Email Spoofing
  22. Incident Response
  23. Secure Login
  24. Security Awareness
  25. Phishing