Filtered to Perfection: Votiro’s Two-Layer Approach to Cybersecurity