Firewall Accountability Five (5)
Hacker Business continuity management Clean Desk Policy Deemed Consent Phishing Emails Wi- Fi 7Zip Cyber- attack Cybersecurity CSA DPO Hacker Privacy Policy PDPC Data Classification Back- up IT Security Availability IT Support Nine (9) Malware Social Engineering Bring your own device (BYOD) Restricted Digital Security Internet Ransomware Data Protection C.A.R.E Integrity Insider Threat BitLocker Risk Notification Incident Response Retention Personal Data Smart Devices PDPA Cyber Security Confidential Social Engineering Data Breach Password Cybercrime Encryption Firewall Accountability Five (5) Hacker Business continuity management Clean Desk Policy Deemed Consent Phishing Emails Wi- Fi 7Zip Cyber- attack Cybersecurity CSA DPO Hacker Privacy Policy PDPC Data Classification Back- up IT Security Availability IT Support Nine (9) Malware Social Engineering Bring your own device (BYOD) Restricted Digital Security Internet Ransomware Data Protection C.A.R.E Integrity Insider Threat BitLocker Risk Notification Incident Response Retention Personal Data Smart Devices PDPA Cyber Security Confidential Social Engineering Data Breach Password Cybercrime Encryption
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Firewall
Accountability
Five (5)
Hacker
Business continuity management
Clean Desk Policy
Deemed Consent
Phishing Emails
Wi-Fi
7Zip
Cyber-attack
Cybersecurity
CSA
DPO
Hacker
Privacy Policy
PDPC
Data Classification
Back-up
IT Security
Availability
IT Support
Nine (9)
Malware
Social Engineering
Bring your own device (BYOD)
Restricted
Digital Security
Internet
Ransomware
Data Protection
C.A.R.E
Integrity
Insider Threat
BitLocker
Risk
Notification
Incident Response
Retention
Personal Data
Smart Devices
PDPA
Cyber
Security
Confidential
Social Engineering
Data Breach
Password
Cybercrime
Encryption