Phishing critical files Networks GDPR digital data Information Security Sensitive payment option information systems BYOD lockout security SDLC security awareness Social Media Scams Policy data privacy Standards data security PII database vulnerability MFA data information classification standards backup Smishing cookies Cybersecurity Landscape Access Control Guidelines server restricted compromise confidential Internal Use Procedures Password Access Control Policy 12 characters DPA Phishing critical files Networks GDPR digital data Information Security Sensitive payment option information systems BYOD lockout security SDLC security awareness Social Media Scams Policy data privacy Standards data security PII database vulnerability MFA data information classification standards backup Smishing cookies Cybersecurity Landscape Access Control Guidelines server restricted compromise confidential Internal Use Procedures Password Access Control Policy 12 characters DPA
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Phishing
critical files
Networks
GDPR
digital data
Information Security
Sensitive
payment option
information systems
BYOD
lockout
security
SDLC
security awareness
Social Media Scams
Policy
data privacy
Standards
data security
PII
database
vulnerability
MFA
data
information classification standards
backup
Smishing
cookies
Cybersecurity Landscape
Access Control
Guidelines
server
restricted
compromise
confidential
Internal Use
Procedures
Password
Access Control Policy
12 characters
DPA