Availability Password
Ransomware BitLocker Cyber- attack Incident Response Social Engineering Smart Devices Encryption Phishing Emails Data Classification Cyber Security PDPC Hacker Clean Desk Policy Notification 7Zip Malware Business continuity management Retention Cybersecurity Internet Bring your own device (BYOD) Digital Security Deemed Consent DPO Risk CSA Cybercrime Accountability Data Protection Social Engineering Firewall C.A.R.E Integrity Privacy Policy IT Support Wi- Fi IT Security Insider Threat PDPA Nine (9) Hacker Data Breach Five (5) Personal Data Confidential Back- up Restricted Availability Password Ransomware BitLocker Cyber- attack Incident Response Social Engineering Smart Devices Encryption Phishing Emails Data Classification Cyber Security PDPC Hacker Clean Desk Policy Notification 7Zip Malware Business continuity management Retention Cybersecurity Internet Bring your own device (BYOD) Digital Security Deemed Consent DPO Risk CSA Cybercrime Accountability Data Protection Social Engineering Firewall C.A.R.E Integrity Privacy Policy IT Support Wi- Fi IT Security Insider Threat PDPA Nine (9) Hacker Data Breach Five (5) Personal Data Confidential Back- up Restricted
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Availability
Password
Ransomware
BitLocker
Cyber-attack
Incident Response
Social Engineering
Smart Devices
Encryption
Phishing Emails
Data Classification
Cyber
Security
PDPC
Hacker
Clean Desk Policy
Notification
7Zip
Malware
Business continuity management
Retention
Cybersecurity
Internet
Bring your own device (BYOD)
Digital Security
Deemed Consent
DPO
Risk
CSA
Cybercrime
Accountability
Data Protection
Social Engineering
Firewall
C.A.R.E
Integrity
Privacy Policy
IT Support
Wi-Fi
IT Security
Insider Threat
PDPA
Nine (9)
Hacker
Data Breach
Five (5)
Personal Data
Confidential
Back-up
Restricted