Computerized methods and systems receive password-protected data from a network at an entity coupled to the network. The password-protected data is intended for receipt by a user of an endpoint coupled to the network, and a password is assigned to the password-protected data which allows access to the password-protected data. The entity attempts to access the password-protected data by applying a set of rules and policies to the password-protected data. The entity requests the assigned password from a user of the endpoint, based on the outcome of the rules and policies, to determine whether the password-protected data includes potentially malicious components.