Skip to main content

Threats to Business Assets

Visualize how threat actors could impact your business assets — and what’s at risk.

Updated over 5 months ago

Overview

The Threats to Business Assets view gives you a clear picture of how different types of attackers are connected to your most critical business assets. This article explains how to use the view to explore risk relationships and interpret the visual cues.
It helps you identify high-likelihood threats and understand which business areas they affect.


Exploring the Threats View

This section of the Risk Dashboard shows a visual map that links:

  • Threats — like an external attacker or insider employee

  • Business assets — such as customer information or business continuity

You’ll see threats listed on the left and assets on the right. Lines between them represent potential attack paths.


How to Interact with the View

  • Hover over a threat to highlight which business assets it puts at risk (Watch the short recording attached at the end of this article - which demonstrates how to hover over the threat you wish to view).

  • Hover over a business asset to see which threat types are connected to it.

  • Lines will animate between the selected item and its connected elements.


What the Line Colors Mean

  • Red line: The likelihood of a breach through this path is over 50%.

  • Gray line: The likelihood is under 50%.

  • No line: There’s no complete or valid attack route — either it doesn’t exist or it hasn’t been fully mapped yet.


Important notes

  • This view depends on proper onboarding — if business assets or threats haven’t been defined yet, some connections may be missing.

  • The color coding is based on Hyver’s internal risk model, using real findings and calculated likelihoods.


Wrap-up / Next Steps

This tool gives you more than just a map — it helps you focus attention where it matters. Use the colors and connections to prioritize threat response and start building targeted mitigation plans.
Explore different views to see how each risk actor intersects with your business priorities.


Did this answer your question?