My two-year-old Linux installation gets more frequent updates that take far less time than my Synology NAS to run. Further, Debian usually doesn't have to reboot when it gets its updates (even Kernel updates). My Synology NAS is usually out of commission for at least ten minutes when doing a point point update.
Blaming bad user behavior on software and firewalls is to ignore the real problem but you can't say enough bad things about companies that regularly hit the 7.6 mark or higher in the CERT vulnerability report.
I think I am missing your point. Are you using your NAS as a router? I did not order a NAS. I ordered a router (which does do some rudimentary NAS functions, like most modern routers). Synology issues quarterly updates for their router products, plus interim patches as needed. I am not interested in managing Snort myself, thanks very much. I spend all day working with arcane technology problems. I don't want to do it in my spare time too.
Not sure about the update times -- I found no mention of that being an issue in any of the reviews or comments I read. I guess I'll find out.
I cannot find the report you reference which ranks companies, so I don't know which company you are referring to. Apple? Synology?
As for bad user behavior, yes that is a major factor in most breaches, but the reality is, you don't need to click on a phishing link to get infected. Malware in ads, trackers, etc. are a major source of infections that are almost impossible to completely avoid if you want to use the web. At my work, most of the malware that Crowdstrike detects is in tracking beacons. This is why people need more than just a NAT between them and the internet. At the very least, they need something to detect suspicious activity on their network.