BYOD 12 characters Virus cookies critical files accountability Scam digital data Sensitive Networks information classification standards Risk data security confidential Access Control lockout Internal Use 80/20 Phishing Social Media Scams Pretexting information systems GDPR vulnerability Vishing Cybersecurity Landscape Ransomware Threat lockout security database Information Security Trojan backup Social Engineering Vulnerability Standards Smishing data privacy Breach DPA SLA payment option Guidelines MFA SDLC security awareness Password Spear Phishing Policy data server Access Control Policy Worm compromise Threat Landscape PII Procedures Phishing restricted BYOD 12 characters Virus cookies critical files accountability Scam digital data Sensitive Networks information classification standards Risk data security confidential Access Control lockout Internal Use 80/20 Phishing Social Media Scams Pretexting information systems GDPR vulnerability Vishing Cybersecurity Landscape Ransomware Threat lockout security database Information Security Trojan backup Social Engineering Vulnerability Standards Smishing data privacy Breach DPA SLA payment option Guidelines MFA SDLC security awareness Password Spear Phishing Policy data server Access Control Policy Worm compromise Threat Landscape PII Procedures Phishing restricted
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
BYOD
12 characters
Virus
cookies
critical files
accountability
Scam
digital data
Sensitive
Networks
information classification standards
Risk
data security
confidential
Access Control
lockout
Internal Use
80/20
Phishing
Social Media Scams
Pretexting
information systems
GDPR
vulnerability
Vishing
Cybersecurity Landscape
Ransomware
Threat
lockout
security
database
Information Security
Trojan
backup
Social Engineering
Vulnerability
Standards
Smishing
data privacy
Breach
DPA
SLA
payment option
Guidelines
MFA
SDLC
security awareness
Password
Spear Phishing
Policy
data
server
Access Control Policy
Worm
compromise
Threat Landscape
PII
Procedures
Phishing
restricted