Only open up attachments from a vetted and trusted source. When doubtful, communicate with the alleged sender directly. In the event the sender is non-responsive or obscure in regards to the context, it would be ideal to presume it was a phishing try and report it directly to the IT and/or the safety group.The knowledge With this information serves