Managers of information technology systems in both the private and public sectors have had their hands full dealing with security breaches that come from hackers invading IT systems. Increasingly, however, IT systems are becoming vulnerable from another channel - the actual supply chain sources of both hardware equipment and software programs.