Read this post to learn how this attack work and cold boot attack protection.
And one protection is the computers would overwrite RAM contents when restoring the power after a cold boot.
And their way requires physical access and a special tool to extract leftover RAM.
This bug affects nearly all computers, including desktop, all-in-one machines, and laptops.
The good news is that the attack cannot be executed remotely and requires physical access to the gadget.
Besides, keep your computers in a secure place since this attack requires physical access to the target OS.
Although some cached RAM data can be retrieved, encryption keys are cleared from RAM.
So theres no valuable info for an attacker to steal.
He also advises companies to be prepared to solve web connection problems.
But if you have a PC backup, this can protect your data to a certain extent.