Cyber Security Deemed Consent C.A.R.E Data Classification Bring your own device (BYOD) Incident Response Password Encryption PDPC Data Protection 7Zip Malware Firewall BitLocker Clean Desk Policy Hacker IT Support Notification Insider Threat Data Breach Back- up Restricted CSA Internet Risk PDPA Social Engineering Retention Cyber- attack Hacker Wi- Fi Nine (9) DPO Accountability Digital Security Privacy Policy Confidential Cybersecurity Five (5) Cybercrime Ransomware Personal Data Social Engineering Smart Devices Availability Integrity Business continuity management Phishing Emails IT Security Cyber Security Deemed Consent C.A.R.E Data Classification Bring your own device (BYOD) Incident Response Password Encryption PDPC Data Protection 7Zip Malware Firewall BitLocker Clean Desk Policy Hacker IT Support Notification Insider Threat Data Breach Back- up Restricted CSA Internet Risk PDPA Social Engineering Retention Cyber- attack Hacker Wi- Fi Nine (9) DPO Accountability Digital Security Privacy Policy Confidential Cybersecurity Five (5) Cybercrime Ransomware Personal Data Social Engineering Smart Devices Availability Integrity Business continuity management Phishing Emails IT Security
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cyber
Security
Deemed Consent
C.A.R.E
Data Classification
Bring your own device (BYOD)
Incident Response
Password
Encryption
PDPC
Data Protection
7Zip
Malware
Firewall
BitLocker
Clean Desk Policy
Hacker
IT Support
Notification
Insider Threat
Data Breach
Back-up
Restricted
CSA
Internet
Risk
PDPA
Social Engineering
Retention
Cyber-attack
Hacker
Wi-Fi
Nine (9)
DPO
Accountability
Digital Security
Privacy Policy
Confidential
Cybersecurity
Five (5)
Cybercrime
Ransomware
Personal Data
Social Engineering
Smart Devices
Availability
Integrity
Business continuity management
Phishing Emails
IT Security