Best Practices To Apply When Evaluating A Suspicious Email