You are investigating a phishing email incident. The email contains a link to a suspicious website. What is the BEST way to analyze the website without risking infection of your forensic workstation?
a) Click the link directly to examine the website's content.
b) Use a virtual machine or sandboxed environment to access and analyze the website.
c) Forward the email to the website administrator to report the phishing attempt.
d) Ignore the link and focus on analyzing the email itself.