Standards Password PII Networks 12 characters 80/20 BYOD Policy SDLC Breach data backup Ransomware lockout Procedures Risk server Sensitive Worm Access Control Policy accountability security awareness data privacy Internal Use Phishing Threat Landscape confidential Smishing Vishing Pretexting GDPR Virus database restricted compromise Access Control Information Security critical files Spear Phishing MFA Guidelines Social Media Scams vulnerability Trojan lockout Scam payment option information systems Cybersecurity Landscape digital data Social Engineering Threat security DPA information classification standards SLA cookies Phishing data security Vulnerability Standards Password PII Networks 12 characters 80/20 BYOD Policy SDLC Breach data backup Ransomware lockout Procedures Risk server Sensitive Worm Access Control Policy accountability security awareness data privacy Internal Use Phishing Threat Landscape confidential Smishing Vishing Pretexting GDPR Virus database restricted compromise Access Control Information Security critical files Spear Phishing MFA Guidelines Social Media Scams vulnerability Trojan lockout Scam payment option information systems Cybersecurity Landscape digital data Social Engineering Threat security DPA information classification standards SLA cookies Phishing data security Vulnerability
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Standards
Password
PII
Networks
12 characters
80/20
BYOD
Policy
SDLC
Breach
data
backup
Ransomware
lockout
Procedures
Risk
server
Sensitive
Worm
Access Control Policy
accountability
security awareness
data privacy
Internal Use
Phishing
Threat Landscape
confidential
Smishing
Vishing
Pretexting
GDPR
Virus
database
restricted
compromise
Access Control
Information Security
critical files
Spear Phishing
MFA
Guidelines
Social Media Scams
vulnerability
Trojan
lockout
Scam
payment option
information systems
Cybersecurity Landscape
digital data
Social Engineering
Threat
security
DPA
information classification standards
SLA
cookies
Phishing
data security
Vulnerability