Keep your data and files away from the attacks, why not? Automate the cyber-security job, good! Allowing malware and attacks to run and probe for weaknesses, bad! Read less