Incidentally, there is a way to protect from that vulnerability by requiring password auth at boot time pre-OS and it could be configured in UEFI.
Yes, I have done just that on my laptop; It's configured to prompt for the UEFI password whenever the system starts up. (If that's a pain, it can be configured to prompt for a password if it detects that the rear was temporarily removed)
Anyway, this emphasizes on the need to have your data secured at multiple levels. To obtain useful data via this exploit, an attacker would need to have physical access to the system, bypass UFEI security, and finally decrypt data at application levels as well.
All this isn't impossible, but will definitely increase the effort / time required to obtain the data --- and probably dissuade an attacker unless the data is really very valuable.