The Role of Proxy Servers in Modern Cybersecurity Strategies