Threat Modeling over Coffee: A simple method of Data Prioritization