Spear Phishing security awareness SDLC server payment option lockout Information Security lockout Access Control Policy cookies SLA Procedures PII Risk compromise information systems MFA vulnerability Password restricted Phishing Social Engineering information classification standards Internal Use confidential accountability data Ransomware DPA Smishing security GDPR BYOD Cybersecurity Landscape Vulnerability Virus Networks data privacy critical files Breach 12 characters backup Threat Landscape Threat Access Control Trojan Guidelines Worm digital data 80/20 data security Scam Phishing Vishing Social Media Scams Standards Pretexting Policy Sensitive database Spear Phishing security awareness SDLC server payment option lockout Information Security lockout Access Control Policy cookies SLA Procedures PII Risk compromise information systems MFA vulnerability Password restricted Phishing Social Engineering information classification standards Internal Use confidential accountability data Ransomware DPA Smishing security GDPR BYOD Cybersecurity Landscape Vulnerability Virus Networks data privacy critical files Breach 12 characters backup Threat Landscape Threat Access Control Trojan Guidelines Worm digital data 80/20 data security Scam Phishing Vishing Social Media Scams Standards Pretexting Policy Sensitive database
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Spear Phishing
security awareness
SDLC
server
payment option
lockout
Information Security
lockout
Access Control Policy
cookies
SLA
Procedures
PII
Risk
compromise
information systems
MFA
vulnerability
Password
restricted
Phishing
Social Engineering
information classification standards
Internal Use
confidential
accountability
data
Ransomware
DPA
Smishing
security
GDPR
BYOD
Cybersecurity Landscape
Vulnerability
Virus
Networks
data privacy
critical files
Breach
12 characters
backup
Threat Landscape
Threat
Access Control
Trojan
Guidelines
Worm
digital data
80/20
data security
Scam
Phishing
Vishing
Social Media Scams
Standards
Pretexting
Policy
Sensitive
database