“The computer is still vulnerable to many other methods of attack.”

“If [you use] cloud-based resources, enquire with your provider regarding their TEMPEST compliance.”

… effort is much better spent protecting against attacks that matter.

A laptop computer sitting on a red surface connected to an external drive with an iPhone and a thumb drive nearby.

Anton Marchenkov / Getty Images

Canzanese asserts the SATAn attack highlights the importance of restricting physical access to computers that hold sensitive data.

A SATA interface inside a computer.

Daniil Dubov / Getty Images