Five (5) Personal Data Firewall
Malware Data Breach IT Support Confidential Cybersecurity Clean Desk Policy Accountability Data Protection Incident Response Bring your own device (BYOD) Integrity Restricted Cybercrime Back- up Nine (9) Privacy Policy Internet Cyber- attack Password Digital Security PDPC PDPA Cyber Security Business continuity management C.A.R.E Hacker BitLocker Insider Threat CSA Retention Smart Devices Deemed Consent 7Zip IT Security Notification Social Engineering Phishing Emails Risk Wi- Fi Availability Data Classification Ransomware Hacker DPO Social Engineering Encryption Five (5) Personal Data Firewall Malware Data Breach IT Support Confidential Cybersecurity Clean Desk Policy Accountability Data Protection Incident Response Bring your own device (BYOD) Integrity Restricted Cybercrime Back- up Nine (9) Privacy Policy Internet Cyber- attack Password Digital Security PDPC PDPA Cyber Security Business continuity management C.A.R.E Hacker BitLocker Insider Threat CSA Retention Smart Devices Deemed Consent 7Zip IT Security Notification Social Engineering Phishing Emails Risk Wi- Fi Availability Data Classification Ransomware Hacker DPO Social Engineering Encryption
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Five (5)
Personal Data
Firewall
Malware
Data Breach
IT Support
Confidential
Cybersecurity
Clean Desk Policy
Accountability
Data Protection
Incident Response
Bring your own device (BYOD)
Integrity
Restricted
Cybercrime
Back-up
Nine (9)
Privacy Policy
Internet
Cyber-attack
Password
Digital Security
PDPC
PDPA
Cyber
Security
Business continuity management
C.A.R.E
Hacker
BitLocker
Insider Threat
CSA
Retention
Smart Devices
Deemed Consent
7Zip
IT Security
Notification
Social Engineering
Phishing Emails
Risk
Wi-Fi
Availability
Data Classification
Ransomware
Hacker
DPO
Social Engineering
Encryption