SecurityAuditDataBreachPublicWi-FiRiskAntivirusIncidentResponseMulti-FactorAuthenticationSecureLoginRiskAssessmentEmailSpoofingMalwarePhishingRansomwareFirewallSecureBackupPatientDataSocialEngineeringZero-DayHIPAAEncryptionSecurityAwarenessAccessControlPasswordManagerVPNTwo-FactorAuthenticationShoulderSurfingSecurityAuditDataBreachPublicWi-FiRiskAntivirusIncidentResponseMulti-FactorAuthenticationSecureLoginRiskAssessmentEmailSpoofingMalwarePhishingRansomwareFirewallSecureBackupPatientDataSocialEngineeringZero-DayHIPAAEncryptionSecurityAwarenessAccessControlPasswordManagerVPNTwo-FactorAuthenticationShoulderSurfing

Breaches and Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Security Audit
  2. Data Breach
  3. Public Wi-Fi Risk
  4. Antivirus
  5. Incident Response
  6. Multi-Factor Authentication
  7. Secure Login
  8. Risk Assessment
  9. Email Spoofing
  10. Malware
  11. Phishing
  12. Ransomware
  13. Firewall
  14. Secure Backup
  15. Patient Data
  16. Social Engineering
  17. Zero-Day
  18. HIPAA
  19. Encryption
  20. Security Awareness
  21. Access Control
  22. Password Manager
  23. VPN
  24. Two-Factor Authentication
  25. Shoulder Surfing