Loading: How to Protect Your Supply Chain from Cybersecurity Vulnerabilities