Many Phishing attacks include password-protected attachments as a means to avoid inspection. These attacks often employ very simple techniques to prevent security solutions from guessing the password and inspecting the attachments, while making it easy for the end user to understand the password.

In these cases other security solutions default to a generic decision - allow-all or block-all. A classic productivity vs. security dilemma.

We now support a unique workflow for handling password-protected attachments, providing maximum coverage for password-protected attachments, without compromising on end user productivity. Here's how we do it: