In most cases, compromises and hacks occur due to non-observance of the simplest security rules.
inbox device for automatic and uninterrupted protection of the home network from common types of attacks
The protection of home infrastructure elements is not given due attention, so it is enough for an attacker to take advantage of the most popular and simple mistakes.
For example using standard logins and passwords. Or use existing exploits for older software versions. Or just scan and find services without authentication settings
the device into an outlet
the devices and networks it detects as your own and others
notifications of security policy violations with instructions