Supermicro Hack Part 2: How can Companies Minimize Exposure?