“The computer is still vulnerable to many other methods of attack.”
“If [you use] cloud-based resources, enquire with your provider regarding their TEMPEST compliance.”
… effort is much better spent protecting against attacks that matter.

Anton Marchenkov / Getty Images
Canzanese asserts the SATAn attack highlights the importance of restricting physical access to computers that hold sensitive data.

Daniil Dubov / Getty Images