Why Are Proxy Servers Important For Cybersecurity?