Castellano
Electoral Census
Electronic Office
Share
X
Facebook
Linkedin
WhatsApp
E-Mail
Copy to clipboard
INEbase
New Communication and Information Technologies
Science and technology
Survey on ICT and Electronic Commerce use in Companies
Science and technology
Survey on the use of ICT and E-commerce in companies 2023-2024
National results
Companies with less than 10 employees
Companies with less than 10 employees
ICT in companies with less than 10 employees (first quarter of 2024)
ICT Security
Units:
Percentage
Select values to consult
Main variables
Values that contain
H.1 % of enterprises that apply some ICT security measure (0)
H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1)
H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1)
H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1)
H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1)
H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1)
H.1.F % of enterprises applying network access control as an ICT security measure (1)
H.1.G % of enterprises applying VPN as an ICT security measure (1)
H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1)
H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1)
H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1)
H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1)
H.2 % of enterprises that make their employees aware of their ICT security obligations (1)
H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2)
H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2)
H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2)
H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0)
H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3)
H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3)
H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3)
H.5 % of enterprises that have experienced an ICT security incident (0)
H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4)
H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4)
H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4)
H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4)
H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4)
H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4)
Selected:
27
Total:
27
Choose format of the table
Main variables
.
.
.
.
.
.
.
.
.
Decimals to show:
By default
0
1
2
Notes
1) The codes at the beginning of each literal refer to the corresponding question of the questionnaire or the section from which they are taken 2) Main variables: 3) (0) Percentage of total of enterprises 4) (1) Percentage of total number of enterprises that implement ICT security measures 5) (2) Percentage of total number of enterprises that ensure their staff know about ICT security measures 6) (3) Percentage of total of enterprises that possess ICT security documents 7) (4) Percentage of total of enterprises that have experienced an ICT security incident
Total:
0
series
y
0
cells
Source:National Statistics Institute