The Role of Proxy Services in Modern Cybersecurity Strategies