This email was translated using machine translation. Please forgive us for any inaccuracies.

TO READ IN ANOTHER LANGUAGE, CLICK HERE!

Join Our Next Cybersecurity Awareness Forum!

Welcome to Week 2 of Cybersecurity Week! We had a great conversation at our first Cybersecurity Awareness Forum! 

 

We’d love to have you join us for our next forum on October 14 from 8 to 9 a.m. CDT. 

Sign up here to attend!

You will receive an Outlook invitation within 24 hours of submitting the form. 

Test Your Cybersecurity Knowledge: The Week 2 Challenge is Here!

But first, the Week 1 winners!

Thanks for participating in the Week 1 Cybersecurity Awareness Challenge!  

  • 201 of you submitted the quiz this week. 
  • Close to 52% of you (104 total) achieved a perfect score!
  • Congratulations to this week’s top performersclick here for the leaderboard.   

 

U.S. team members: We have a winner! We drew a name from all U.S. team members who got 15 answers correct. The winner of this week’s $50 BW merchandise card is Duane DaCosta, BW Packaging Field Service Technician based in Florida. A member of the IT Communications and Strategic Support team will be in touch with details.   

 

Remember, U.S. team members, every time you participate is an additional chance to win in the final drawing on October 29you don’t have to make the leaderboard to be in the final drawing! So keep submitting the quiz each week!  

 

Quiz Challenge Details: 

  • Quiz Challenge Week 2 launches today! Find the link below. 
  • Take the quiz by Tuesday, October 14, by 8 a.m. CDT.      
  • One entry per team member. 
  • This quiz is not anonymous. Your name will be recorded upon submission.       
  • Winners will be posted in our weekly newsletter throughout October. 
  • U.S.-based team members only:  Each week, a prize will be provided to the U.S.-based team member who successfully submitted the most correct answers before the Tuesday, 8 a.m. CDT deadline. Ties will be settled through a drawing from the names of everyone who successfully submitted the same number of the most correct answers before the Tuesday, 8 a.m. CDT deadline. 
    • One more way for U.S.-based team members to win a prize: On October 29, we will randomly draw a name from everyone who completed/submitted a quiz or quizzes throughout the four quiz challenges. Each quiz counts as one entry in the October 29 drawing. 

 

Ready to crush the CSAM challenge for Week 2? 

Once you launch the quiz, the timer begins. Select the best answer to each question. The quiz will close at the end of 8 minutes, whether you finished or not, and you cannot relaunch it. So, don’t launch the quiz until you are ready to commit the full 8 minutes to completing it. 

Cybersecurity Awareness Weekly Challenge 2

Be aware: "Contact Us" forms are being used to specifically target industrial manufacturing companies like ours

Our Week Two tip-of-the-week spotlights just how intrusive cybercriminals have become. Cybersecurity industry experts warn that attackers are using new, unique ways to bypass security defenses and are targeting organizations across multiple sectors—but mainly in the U.S., and overwhelmingly in industrial manufacturing. 

 

Financially motivated cyber attackers are increasingly exploiting the “Contact Us” forms found on company websites to initiate deceptive outreachThis scheme is a form of business e-mail compromise (BEC). BEC is when an attacker impersonates a trustworthy business relationship, such as a vendor, to manipulate corporate team members into taking harmful actions. These “Contact Us” forms allow attackers to appear as legitimate business inquiries, tricking employees into engaging in email correspondence. 

Once contact is established, attackers often invest days or even weeks building trust through credible and professional-sounding conversations. To bypass security filters, threat actors frequently use domains that appear to match the names of registered LLCs or previously existing businesses. These tactics help their communications evade detection and appear authentic.

After gaining the victim’s trust, attackers prompt targets to download malicious files, completing the compromise.

Source:

Business email compromise | Federal Bureau of Investigation. (n.d.). https://www.fbi.gov/how-we-can-help-you/scams-and-safety/common-frauds-and-scams/business-email-compromise

 Zorz, Z. (2025, August 29). Attackers use “contact us” forms and fake NDAs to phish industrial manufacturing firms. Help Net Security. https://www.helpnetsecurity.com/2025/08/29/phishing-manufacturing-supply-chain/

 

 

Thank you for joining us for Cybersecurity Awareness Month! And, as always, thank you for your commitment to keeping Barry-Wehmiller’s data and your personal information safe.

View Archive