From tainted mobile operating systems and hardware to backdoors in firewalls and everything in between, how pervasive is this threat and what can organizations do to protect themselves?