vulnerability lockout compromise security Phishing Worm cookies Threat Landscape payment option accountability 12 characters database Virus SLA Access Control Policy Threat Networks Guidelines GDPR information classification standards digital data Pretexting 80/20 SDLC security awareness BYOD Social Engineering Policy Procedures data privacy Cybersecurity Landscape data backup PII Trojan Internal Use confidential MFA Phishing Sensitive Breach restricted information systems server Password Scam Vulnerability Information Security data security critical files Vishing Ransomware Standards Access Control Spear Phishing lockout DPA Risk Smishing Social Media Scams vulnerability lockout compromise security Phishing Worm cookies Threat Landscape payment option accountability 12 characters database Virus SLA Access Control Policy Threat Networks Guidelines GDPR information classification standards digital data Pretexting 80/20 SDLC security awareness BYOD Social Engineering Policy Procedures data privacy Cybersecurity Landscape data backup PII Trojan Internal Use confidential MFA Phishing Sensitive Breach restricted information systems server Password Scam Vulnerability Information Security data security critical files Vishing Ransomware Standards Access Control Spear Phishing lockout DPA Risk Smishing Social Media Scams
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
vulnerability
lockout
compromise
security
Phishing
Worm
cookies
Threat Landscape
payment option
accountability
12 characters
database
Virus
SLA
Access Control Policy
Threat
Networks
Guidelines
GDPR
information classification standards
digital data
Pretexting
80/20
SDLC
security awareness
BYOD
Social Engineering
Policy
Procedures
data privacy
Cybersecurity Landscape
data
backup
PII
Trojan
Internal Use
confidential
MFA
Phishing
Sensitive
Breach
restricted
information systems
server
Password
Scam
Vulnerability
Information Security
data security
critical files
Vishing
Ransomware
Standards
Access Control
Spear Phishing
lockout
DPA
Risk
Smishing
Social Media Scams