because there is a machine talking to both networks and if that is compromised from any side it can then talk to any side and be used as a bridge.
because there is a machine talking to both networks and if that is compromised from any side it can then talk to any side and be used as a bridge.