An eight point plan
In no particular order:
[1] don't open an attachment of, or follow a link in, an email you're not expecting;
[2] verify email validity by inspecting the transport headers (ideally using automation)
[3] in corporate systems, remove and quarantine attachments to emails from outside the enterprise;
[4] either strip link anchors from email bodies at the gateway or expose them to view in the body;
[5] employ a mail filtering service either locally at the gateway or in the cloud;
[6] ditto for web requests;
[7] never rely on workstation-based protection alone against malware;
[8] educate everyone including the Executive in safe email usage.