Proxies are used to make connections on behalf of another device. These are helpful in hiding your details from exposure, however, they are helpful for attackers for the same reason.
Cyber Essentials Scheme Cyber Resilience Cyber Risk Firewall & Network Security Industry & Updates Phishing & Security Awareness Training Technical Vulnerability Management