Prioritization: Step Three of Connected Device Security