Watch this video on YouTube
What is the recommended approach for implementing a scan of all incoming email attachments to mitigate the risk of malicious attachments for an organization whose business nature makes its users vulnerable to such threats?