Data Breach Cybercrime PDPC Personal Data Nine (9) PDPA
Malware Data Protection IT Security Insider Threat IT Support Digital Security Notification DPO Internet Restricted Hacker Retention Social Engineering C.A.R.E Deemed Consent Five (5) Phishing Emails Bring your own device (BYOD) Hacker Accountability Availability Smart Devices Ransomware CSA Firewall Cyber Security Back- up Privacy Policy Incident Response Social Engineering 7Zip BitLocker Encryption Cybersecurity Password Wi- Fi Cyber- attack Data Classification Risk Business continuity management Clean Desk Policy Integrity Confidential Data Breach Cybercrime PDPC Personal Data Nine (9) PDPA Malware Data Protection IT Security Insider Threat IT Support Digital Security Notification DPO Internet Restricted Hacker Retention Social Engineering C.A.R.E Deemed Consent Five (5) Phishing Emails Bring your own device (BYOD) Hacker Accountability Availability Smart Devices Ransomware CSA Firewall Cyber Security Back- up Privacy Policy Incident Response Social Engineering 7Zip BitLocker Encryption Cybersecurity Password Wi- Fi Cyber- attack Data Classification Risk Business continuity management Clean Desk Policy Integrity Confidential
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Breach
Cybercrime
PDPC
Personal Data
Nine (9)
PDPA
Malware
Data Protection
IT Security
Insider Threat
IT Support
Digital Security
Notification
DPO
Internet
Restricted
Hacker
Retention
Social Engineering
C.A.R.E
Deemed Consent
Five (5)
Phishing Emails
Bring your own device (BYOD)
Hacker
Accountability
Availability
Smart Devices
Ransomware
CSA
Firewall
Cyber
Security
Back-up
Privacy Policy
Incident Response
Social Engineering
7Zip
BitLocker
Encryption
Cybersecurity
Password
Wi-Fi
Cyber-attack
Data Classification
Risk
Business continuity management
Clean Desk Policy
Integrity
Confidential