How to Isolate Malicious Email Attachments from Your Network