The attached document provides important guidance on how to recognise and respond to suspect emails.