‘Anything to do with electronics has the potential for data transfer. Anything remotely to do with data is where the vulnerability lies. We are finding methods to overcome this aspect... Supply chains are dependent on Chinese components, how do we overcome them and ensure they are not there... ‘