Not All Data is Created Equal: Why Your Security Strategy Needs Tiers