This is why you need Threat Emulation from Check Point Software. This "random" attachment I received could have easily owned me.: http://instagram.com/p/yVDPuRrEYa/ #instagram