information systems compromise server BYOD Networks MFA security awareness Phishing restricted confidential Procedures Internal Use data privacy SDLC payment option data security PII backup data Access Control Policy DPA Policy Information Security Standards lockout cookies GDPR Smishing Cybersecurity Landscape security information classification standards Sensitive Password Access Control database vulnerability Social Media Scams critical files Guidelines 12 characters digital data information systems compromise server BYOD Networks MFA security awareness Phishing restricted confidential Procedures Internal Use data privacy SDLC payment option data security PII backup data Access Control Policy DPA Policy Information Security Standards lockout cookies GDPR Smishing Cybersecurity Landscape security information classification standards Sensitive Password Access Control database vulnerability Social Media Scams critical files Guidelines 12 characters digital data
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
information systems
compromise
server
BYOD
Networks
MFA
security awareness
Phishing
restricted
confidential
Procedures
Internal Use
data privacy
SDLC
payment option
data security
PII
backup
data
Access Control Policy
DPA
Policy
Information Security
Standards
lockout
cookies
GDPR
Smishing
Cybersecurity Landscape
security
information classification standards
Sensitive
Password
Access Control
database
vulnerability
Social Media Scams
critical files
Guidelines
12 characters
digital data