Activity grouping (except CNAE 56, 64-66 and 95.1) Main variables Size of the enterprise Total Total Enterprises H.1 % of enterprises that apply some ICT security measure (0) Total 91.27 Total Enterprises H.1 % of enterprises that apply some ICT security measure (0) From 10 to 49 90.28 Total Enterprises H.1 % of enterprises that apply some ICT security measure (0) From 50 to 249 95.24 Total Enterprises H.1 % of enterprises that apply some ICT security measure (0) 250 or more 98.94 Total Enterprises H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) Total 91.09 Total Enterprises H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 10 to 49 89.91 Total Enterprises H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 50 to 249 95.66 Total Enterprises H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) 250 or more 98.76 Total Enterprises H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) Total 22.22 Total Enterprises H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 10 to 49 19.04 Total Enterprises H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 50 to 249 32.94 Total Enterprises H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) 250 or more 50.18 Total Enterprises H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) Total 34.55 Total Enterprises H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 10 to 49 29.35 Total Enterprises H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 50 to 249 52.29 Total Enterprises H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) 250 or more 79.22 Total Enterprises H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) Total 40.41 Total Enterprises H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 10 to 49 35.98 Total Enterprises H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 50 to 249 55.37 Total Enterprises H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) 250 or more 79.48 Total Enterprises H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) Total 91.29 Total Enterprises H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 10 to 49 90.35 Total Enterprises H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 50 to 249 94.83 Total Enterprises H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) 250 or more 97.82 Total Enterprises H.1.F % of enterprises applying network access control as an ICT security measure (1) Total 69.59 Total Enterprises H.1.F % of enterprises applying network access control as an ICT security measure (1) From 10 to 49 65.93 Total Enterprises H.1.F % of enterprises applying network access control as an ICT security measure (1) From 50 to 249 83.36 Total Enterprises H.1.F % of enterprises applying network access control as an ICT security measure (1) 250 or more 95.40 Total Enterprises H.1.G % of enterprises applying VPN as an ICT security measure (1) Total 52.30 Total Enterprises H.1.G % of enterprises applying VPN as an ICT security measure (1) From 10 to 49 46.52 Total Enterprises H.1.G % of enterprises applying VPN as an ICT security measure (1) From 50 to 249 74.43 Total Enterprises H.1.G % of enterprises applying VPN as an ICT security measure (1) 250 or more 91.36 Total Enterprises H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) Total 39.30 Total Enterprises H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 10 to 49 34.20 Total Enterprises H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 50 to 249 56.96 Total Enterprises H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) 250 or more 81.93 Total Enterprises H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) Total 37.30 Total Enterprises H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 10 to 49 31.47 Total Enterprises H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 50 to 249 58.03 Total Enterprises H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) 250 or more 83.83 Total Enterprises H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) Total 29.83 Total Enterprises H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 10 to 49 24.57 Total Enterprises H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 50 to 249 47.50 Total Enterprises H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) 250 or more 76.22 Total Enterprises H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) Total 35.33 Total Enterprises H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 10 to 49 30.25 Total Enterprises H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 50 to 249 52.36 Total Enterprises H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) 250 or more 80.54 Total Enterprises H.2 % of enterprises that make their employees aware of their ICT security obligations (1) Total 63.52 Total Enterprises H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 10 to 49 60.21 Total Enterprises H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 50 to 249 75.10 Total Enterprises H.2 % of enterprises that make their employees aware of their ICT security obligations (1) 250 or more 90.75 Total Enterprises H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) Total 77.46 Total Enterprises H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 10 to 49 74.68 Total Enterprises H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 50 to 249 85.21 Total Enterprises H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) 250 or more 92.96 Total Enterprises H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) Total 44.93 Total Enterprises H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 10 to 49 41.04 Total Enterprises H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 50 to 249 53.52 Total Enterprises H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) 250 or more 74.84 Total Enterprises H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) Total 40.01 Total Enterprises H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 10 to 49 37.17 Total Enterprises H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 50 to 249 47.20 Total Enterprises H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) 250 or more 58.46 Total Enterprises H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) Total 31.86 Total Enterprises H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 10 to 49 27.50 Total Enterprises H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 50 to 249 46.58 Total Enterprises H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) 250 or more 77.56 Total Enterprises H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) Total 70.73 Total Enterprises H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 10 to 49 68.41 Total Enterprises H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 50 to 249 74.21 Total Enterprises H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) 250 or more 82.48 Total Enterprises H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) Total 19.13 Total Enterprises H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 10 to 49 20.14 Total Enterprises H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 50 to 249 18.56 Total Enterprises H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) 250 or more 11.43 Total Enterprises H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) Total 10.14 Total Enterprises H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 10 to 49 11.45 Total Enterprises H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 50 to 249 7.24 Total Enterprises H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) 250 or more 6.08 Total Enterprises H.5 % of enterprises that have experienced an ICT security incident (0) Total 16.19 Total Enterprises H.5 % of enterprises that have experienced an ICT security incident (0) From 10 to 49 14.13 Total Enterprises H.5 % of enterprises that have experienced an ICT security incident (0) From 50 to 249 23.55 Total Enterprises H.5 % of enterprises that have experienced an ICT security incident (0) 250 or more 35.99 Total Enterprises H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) Total 74.60 Total Enterprises H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 10 to 49 73.38 Total Enterprises H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 50 to 249 77.22 Total Enterprises H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) 250 or more 79.16 Total Enterprises H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) Total 19.95 Total Enterprises H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 10 to 49 19.30 Total Enterprises H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 50 to 249 21.41 Total Enterprises H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) 250 or more 22.22 Total Enterprises H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) Total 22.08 Total Enterprises H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 10 to 49 22.36 Total Enterprises H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 50 to 249 22.04 Total Enterprises H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) 250 or more 19.29 Total Enterprises H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) Total 16.19 Total Enterprises H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 10 to 49 17.35 Total Enterprises H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 50 to 249 13.17 Total Enterprises H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) 250 or more 13.45 Total Enterprises H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) Total 8.38 Total Enterprises H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 10 to 49 7.63 Total Enterprises H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 50 to 249 9.56 Total Enterprises H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) 250 or more 12.52 Total Enterprises H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) Total 5.33 Total Enterprises H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 10 to 49 4.90 Total Enterprises H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 50 to 249 6.08 Total Enterprises H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) 250 or more 7.56 1. Total Industry (CNAE 10-39) H.1 % of enterprises that apply some ICT security measure (0) Total 91.90 1. Total Industry (CNAE 10-39) H.1 % of enterprises that apply some ICT security measure (0) From 10 to 49 90.45 1. Total Industry (CNAE 10-39) H.1 % of enterprises that apply some ICT security measure (0) From 50 to 249 97.27 1. Total Industry (CNAE 10-39) H.1 % of enterprises that apply some ICT security measure (0) 250 or more 100.00 1. Total Industry (CNAE 10-39) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) Total 90.23 1. Total Industry (CNAE 10-39) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 10 to 49 88.48 1. Total Industry (CNAE 10-39) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 50 to 249 96.08 1. Total Industry (CNAE 10-39) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) 250 or more 99.87 1. Total Industry (CNAE 10-39) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) Total 21.70 1. Total Industry (CNAE 10-39) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 10 to 49 17.25 1. Total Industry (CNAE 10-39) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 50 to 249 34.99 1. Total Industry (CNAE 10-39) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) 250 or more 52.50 1. Total Industry (CNAE 10-39) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) Total 30.27 1. Total Industry (CNAE 10-39) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 10 to 49 22.67 1. Total Industry (CNAE 10-39) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 50 to 249 52.88 1. Total Industry (CNAE 10-39) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) 250 or more 83.33 1. Total Industry (CNAE 10-39) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) Total 34.93 1. Total Industry (CNAE 10-39) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 10 to 49 28.63 1. Total Industry (CNAE 10-39) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 50 to 249 52.90 1. Total Industry (CNAE 10-39) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) 250 or more 82.32 1. Total Industry (CNAE 10-39) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) Total 92.14 1. Total Industry (CNAE 10-39) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 10 to 49 90.90 1. Total Industry (CNAE 10-39) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 50 to 249 96.48 1. Total Industry (CNAE 10-39) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) 250 or more 98.12 1. Total Industry (CNAE 10-39) H.1.F % of enterprises applying network access control as an ICT security measure (1) Total 70.15 1. Total Industry (CNAE 10-39) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 10 to 49 65.27 1. Total Industry (CNAE 10-39) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 50 to 249 86.46 1. Total Industry (CNAE 10-39) H.1.F % of enterprises applying network access control as an ICT security measure (1) 250 or more 96.73 1. Total Industry (CNAE 10-39) H.1.G % of enterprises applying VPN as an ICT security measure (1) Total 51.03 1. Total Industry (CNAE 10-39) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 10 to 49 42.50 1. Total Industry (CNAE 10-39) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 50 to 249 80.03 1. Total Industry (CNAE 10-39) H.1.G % of enterprises applying VPN as an ICT security measure (1) 250 or more 95.50 1. Total Industry (CNAE 10-39) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) Total 35.55 1. Total Industry (CNAE 10-39) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 10 to 49 27.90 1. Total Industry (CNAE 10-39) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 50 to 249 59.20 1. Total Industry (CNAE 10-39) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) 250 or more 85.29 1. Total Industry (CNAE 10-39) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) Total 35.01 1. Total Industry (CNAE 10-39) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 10 to 49 26.84 1. Total Industry (CNAE 10-39) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 50 to 249 60.41 1. Total Industry (CNAE 10-39) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) 250 or more 87.56 1. Total Industry (CNAE 10-39) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) Total 26.45 1. Total Industry (CNAE 10-39) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 10 to 49 19.30 1. Total Industry (CNAE 10-39) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 50 to 249 47.10 1. Total Industry (CNAE 10-39) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) 250 or more 79.28 1. Total Industry (CNAE 10-39) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) Total 33.58 1. Total Industry (CNAE 10-39) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 10 to 49 26.76 1. Total Industry (CNAE 10-39) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 50 to 249 52.92 1. Total Industry (CNAE 10-39) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) 250 or more 85.34 1. Total Industry (CNAE 10-39) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) Total 59.78 1. Total Industry (CNAE 10-39) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 10 to 49 54.42 1. Total Industry (CNAE 10-39) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 50 to 249 76.74 1. Total Industry (CNAE 10-39) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) 250 or more 93.04 1. Total Industry (CNAE 10-39) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) Total 76.96 1. Total Industry (CNAE 10-39) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 10 to 49 73.16 1. Total Industry (CNAE 10-39) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 50 to 249 84.90 1. Total Industry (CNAE 10-39) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) 250 or more 92.84 1. Total Industry (CNAE 10-39) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) Total 40.06 1. Total Industry (CNAE 10-39) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 10 to 49 34.40 1. Total Industry (CNAE 10-39) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 50 to 249 48.23 1. Total Industry (CNAE 10-39) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) 250 or more 76.42 1. Total Industry (CNAE 10-39) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) Total 36.77 1. Total Industry (CNAE 10-39) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 10 to 49 33.56 1. Total Industry (CNAE 10-39) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 50 to 249 42.02 1. Total Industry (CNAE 10-39) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) 250 or more 55.21 1. Total Industry (CNAE 10-39) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) Total 28.34 1. Total Industry (CNAE 10-39) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 10 to 49 22.23 1. Total Industry (CNAE 10-39) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 50 to 249 46.43 1. Total Industry (CNAE 10-39) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) 250 or more 82.02 1. Total Industry (CNAE 10-39) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) Total 68.19 1. Total Industry (CNAE 10-39) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 10 to 49 66.55 1. Total Industry (CNAE 10-39) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 50 to 249 67.13 1. Total Industry (CNAE 10-39) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) 250 or more 80.48 1. Total Industry (CNAE 10-39) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) Total 21.11 1. Total Industry (CNAE 10-39) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 10 to 49 21.05 1. Total Industry (CNAE 10-39) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 50 to 249 24.65 1. Total Industry (CNAE 10-39) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) 250 or more 12.75 1. Total Industry (CNAE 10-39) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) Total 10.69 1. Total Industry (CNAE 10-39) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 10 to 49 12.40 1. Total Industry (CNAE 10-39) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 50 to 249 8.22 1. Total Industry (CNAE 10-39) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) 250 or more 6.77 1. Total Industry (CNAE 10-39) H.5 % of enterprises that have experienced an ICT security incident (0) Total 16.04 1. Total Industry (CNAE 10-39) H.5 % of enterprises that have experienced an ICT security incident (0) From 10 to 49 13.27 1. Total Industry (CNAE 10-39) H.5 % of enterprises that have experienced an ICT security incident (0) From 50 to 249 24.68 1. Total Industry (CNAE 10-39) H.5 % of enterprises that have experienced an ICT security incident (0) 250 or more 38.44 1. Total Industry (CNAE 10-39) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) Total 79.56 1. Total Industry (CNAE 10-39) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 10 to 49 78.84 1. Total Industry (CNAE 10-39) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 50 to 249 80.64 1. Total Industry (CNAE 10-39) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) 250 or more 81.97 1. Total Industry (CNAE 10-39) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) Total 14.10 1. Total Industry (CNAE 10-39) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 10 to 49 12.39 1. Total Industry (CNAE 10-39) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 50 to 249 16.68 1. Total Industry (CNAE 10-39) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) 250 or more 19.67 1. Total Industry (CNAE 10-39) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) Total 22.98 1. Total Industry (CNAE 10-39) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 10 to 49 26.67 1. Total Industry (CNAE 10-39) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 50 to 249 14.40 1. Total Industry (CNAE 10-39) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) 250 or more 19.37 1. Total Industry (CNAE 10-39) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) Total 12.32 1. Total Industry (CNAE 10-39) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 10 to 49 13.04 1. Total Industry (CNAE 10-39) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 50 to 249 10.49 1. Total Industry (CNAE 10-39) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) 250 or more 12.10 1. Total Industry (CNAE 10-39) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) Total 7.89 1. Total Industry (CNAE 10-39) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 10 to 49 7.86 1. Total Industry (CNAE 10-39) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 50 to 249 7.09 1. Total Industry (CNAE 10-39) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) 250 or more 10.32 1. Total Industry (CNAE 10-39) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) Total 3.13 1. Total Industry (CNAE 10-39) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 10 to 49 2.95 1. Total Industry (CNAE 10-39) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 50 to 249 3.05 1. Total Industry (CNAE 10-39) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) 250 or more 4.72 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1 % of enterprises that apply some ICT security measure (0) Total 90.21 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1 % of enterprises that apply some ICT security measure (0) From 10 to 49 88.93 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1 % of enterprises that apply some ICT security measure (0) From 50 to 249 95.51 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1 % of enterprises that apply some ICT security measure (0) 250 or more 100.00 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) Total 90.05 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 10 to 49 88.43 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 50 to 249 96.47 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) 250 or more 100.00 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) Total 22.95 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 10 to 49 19.18 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 50 to 249 37.18 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) 250 or more 49.55 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) Total 27.22 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 10 to 49 20.46 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 50 to 249 52.05 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) 250 or more 78.19 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) Total 30.94 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 10 to 49 25.71 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 50 to 249 48.71 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) 250 or more 77.41 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) Total 90.53 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 10 to 49 89.07 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 50 to 249 96.78 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) 250 or more 97.18 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.F % of enterprises applying network access control as an ICT security measure (1) Total 67.11 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 10 to 49 62.36 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 50 to 249 86.12 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.F % of enterprises applying network access control as an ICT security measure (1) 250 or more 95.54 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.G % of enterprises applying VPN as an ICT security measure (1) Total 47.30 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 10 to 49 39.65 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 50 to 249 78.49 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.G % of enterprises applying VPN as an ICT security measure (1) 250 or more 90.62 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) Total 32.85 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 10 to 49 26.67 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 50 to 249 54.90 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) 250 or more 82.46 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) Total 31.74 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 10 to 49 24.56 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 50 to 249 58.61 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) 250 or more 83.50 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) Total 23.23 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 10 to 49 17.47 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 50 to 249 42.98 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) 250 or more 73.50 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) Total 30.72 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 10 to 49 24.98 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 50 to 249 50.83 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) 250 or more 78.54 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) Total 60.67 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 10 to 49 56.70 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 50 to 249 75.37 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) 250 or more 90.05 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) Total 75.00 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 10 to 49 72.72 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 50 to 249 80.39 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) 250 or more 89.39 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) Total 32.67 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 10 to 49 27.26 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 50 to 249 44.90 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) 250 or more 69.28 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) Total 38.35 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 10 to 49 36.15 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 50 to 249 44.23 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) 250 or more 49.48 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) Total 28.17 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 10 to 49 24.73 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 50 to 249 38.01 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) 250 or more 75.91 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) Total 69.31 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 10 to 49 69.86 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 50 to 249 64.65 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) 250 or more 75.84 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) Total 20.81 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 10 to 49 19.22 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 50 to 249 28.40 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) 250 or more 16.48 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) Total 9.89 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 10 to 49 10.93 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 50 to 249 6.95 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) 250 or more 7.68 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5 % of enterprises that have experienced an ICT security incident (0) Total 19.36 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5 % of enterprises that have experienced an ICT security incident (0) From 10 to 49 16.97 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5 % of enterprises that have experienced an ICT security incident (0) From 50 to 249 27.62 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5 % of enterprises that have experienced an ICT security incident (0) 250 or more 45.59 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) Total 84.18 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 10 to 49 84.96 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 50 to 249 82.70 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) 250 or more 80.42 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) Total 10.64 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 10 to 49 8.58 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 50 to 249 16.63 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) 250 or more 14.20 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) Total 30.82 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 10 to 49 34.18 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 50 to 249 20.50 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) 250 or more 26.80 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) Total 6.81 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 10 to 49 4.96 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 50 to 249 12.03 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) 250 or more 10.53 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) Total 5.63 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 10 to 49 4.78 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 50 to 249 8.20 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) 250 or more 6.72 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) Total 3.58 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 10 to 49 3.83 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 50 to 249 2.16 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) 250 or more 5.18 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1 % of enterprises that apply some ICT security measure (0) Total 92.62 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1 % of enterprises that apply some ICT security measure (0) From 10 to 49 90.58 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1 % of enterprises that apply some ICT security measure (0) From 50 to 249 97.15 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1 % of enterprises that apply some ICT security measure (0) 250 or more 100.00 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) Total 90.00 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 10 to 49 87.17 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 50 to 249 95.63 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) 250 or more 100.00 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) Total 22.81 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 10 to 49 15.81 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 50 to 249 34.90 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) 250 or more 53.64 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) Total 36.18 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 10 to 49 24.69 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 50 to 249 54.47 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) 250 or more 91.91 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) Total 39.28 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 10 to 49 28.65 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 50 to 249 57.52 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) 250 or more 86.37 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) Total 94.14 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 10 to 49 92.28 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 50 to 249 98.37 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) 250 or more 98.93 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.F % of enterprises applying network access control as an ICT security measure (1) Total 76.46 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 10 to 49 69.47 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 50 to 249 90.95 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.F % of enterprises applying network access control as an ICT security measure (1) 250 or more 99.18 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.G % of enterprises applying VPN as an ICT security measure (1) Total 56.33 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 10 to 49 42.66 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 50 to 249 85.21 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.G % of enterprises applying VPN as an ICT security measure (1) 250 or more 99.03 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) Total 42.52 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 10 to 49 30.21 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 50 to 249 66.19 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) 250 or more 88.68 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) Total 41.20 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 10 to 49 27.19 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 50 to 249 68.91 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) 250 or more 91.14 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) Total 30.18 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 10 to 49 17.76 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 50 to 249 52.76 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) 250 or more 81.00 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) Total 36.78 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 10 to 49 23.56 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 50 to 249 62.08 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) 250 or more 86.70 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) Total 59.95 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 10 to 49 50.24 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 50 to 249 78.63 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) 250 or more 96.24 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) Total 82.93 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 10 to 49 77.01 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 50 to 249 89.88 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) 250 or more 95.39 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) Total 45.00 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 10 to 49 35.92 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 50 to 249 48.77 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) 250 or more 82.92 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) Total 38.20 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 10 to 49 35.04 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 50 to 249 37.09 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) 250 or more 57.93 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) Total 30.25 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 10 to 49 19.86 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 50 to 249 48.23 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) 250 or more 85.05 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) Total 72.67 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 10 to 49 68.06 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 50 to 249 74.01 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) 250 or more 82.12 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) Total 18.09 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 10 to 49 19.28 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 50 to 249 19.16 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) 250 or more 12.87 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) Total 9.25 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 10 to 49 12.67 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 50 to 249 6.82 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) 250 or more 5.01 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5 % of enterprises that have experienced an ICT security incident (0) Total 17.53 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5 % of enterprises that have experienced an ICT security incident (0) From 10 to 49 14.74 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5 % of enterprises that have experienced an ICT security incident (0) From 50 to 249 20.95 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5 % of enterprises that have experienced an ICT security incident (0) 250 or more 37.08 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) Total 82.79 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 10 to 49 79.17 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 50 to 249 91.33 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) 250 or more 82.40 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) Total 12.36 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 10 to 49 12.72 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 50 to 249 10.75 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) 250 or more 13.82 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) Total 10.64 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 10 to 49 10.87 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 50 to 249 6.61 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) 250 or more 17.43 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) Total 13.13 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 10 to 49 17.52 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 50 to 249 4.84 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) 250 or more 9.61 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) Total 10.62 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 10 to 49 11.80 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 50 to 249 6.17 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) 250 or more 14.01 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) Total 0.85 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 10 to 49 0.00 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 50 to 249 1.93 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) 250 or more 2.55 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1 % of enterprises that apply some ICT security measure (0) Total 90.08 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1 % of enterprises that apply some ICT security measure (0) From 10 to 49 88.42 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1 % of enterprises that apply some ICT security measure (0) From 50 to 249 98.71 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1 % of enterprises that apply some ICT security measure (0) 250 or more 100.00 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) Total 89.02 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 10 to 49 87.30 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 50 to 249 96.78 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) 250 or more 100.00 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) Total 16.08 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 10 to 49 13.53 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 50 to 249 26.10 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) 250 or more 42.14 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) Total 29.32 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 10 to 49 23.98 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 50 to 249 50.22 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) 250 or more 84.36 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) Total 33.25 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 10 to 49 28.76 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 50 to 249 51.53 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) 250 or more 74.92 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) Total 93.41 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 10 to 49 93.12 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 50 to 249 94.42 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) 250 or more 97.17 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.F % of enterprises applying network access control as an ICT security measure (1) Total 70.66 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 10 to 49 67.95 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 50 to 249 81.50 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.F % of enterprises applying network access control as an ICT security measure (1) 250 or more 97.17 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.G % of enterprises applying VPN as an ICT security measure (1) Total 45.58 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 10 to 49 38.90 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 50 to 249 74.14 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.G % of enterprises applying VPN as an ICT security measure (1) 250 or more 98.30 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) Total 30.36 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 10 to 49 24.69 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 50 to 249 53.41 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) 250 or more 83.41 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) Total 29.71 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 10 to 49 23.97 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 50 to 249 52.59 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) 250 or more 86.40 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) Total 21.72 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 10 to 49 15.85 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 50 to 249 45.26 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) 250 or more 78.56 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) Total 29.00 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 10 to 49 24.16 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 50 to 249 45.75 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) 250 or more 93.59 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) Total 55.55 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 10 to 49 50.95 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 50 to 249 74.62 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) 250 or more 95.89 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) Total 68.98 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 10 to 49 64.66 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 50 to 249 81.28 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) 250 or more 88.60 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) Total 44.58 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 10 to 49 41.93 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 50 to 249 48.85 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) 250 or more 73.68 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) Total 29.59 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 10 to 49 27.71 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 50 to 249 31.96 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) 250 or more 53.48 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) Total 23.92 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 10 to 49 19.16 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 50 to 249 44.36 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) 250 or more 81.74 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) Total 63.80 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 10 to 49 59.01 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 50 to 249 70.42 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) 250 or more 85.73 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) Total 18.44 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 10 to 49 19.38 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 50 to 249 19.82 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) 250 or more 4.48 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) Total 17.75 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 10 to 49 21.61 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 50 to 249 9.76 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) 250 or more 9.79 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5 % of enterprises that have experienced an ICT security incident (0) Total 10.42 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5 % of enterprises that have experienced an ICT security incident (0) From 10 to 49 8.13 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5 % of enterprises that have experienced an ICT security incident (0) From 50 to 249 20.33 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5 % of enterprises that have experienced an ICT security incident (0) 250 or more 37.61 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) Total 69.09 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 10 to 49 67.15 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 50 to 249 70.28 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) 250 or more 81.90 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) Total 12.71 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 10 to 49 11.99 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 50 to 249 13.69 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) 250 or more 15.50 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) Total 19.58 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 10 to 49 19.62 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 50 to 249 19.88 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) 250 or more 18.10 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) Total 16.73 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 10 to 49 18.39 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 50 to 249 13.54 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) 250 or more 13.59 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) Total 8.98 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 10 to 49 9.08 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 50 to 249 10.32 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) 250 or more 3.22 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) Total 6.75 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 10 to 49 6.41 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 50 to 249 8.83 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) 250 or more 2.25 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1 % of enterprises that apply some ICT security measure (0) Total 94.59 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1 % of enterprises that apply some ICT security measure (0) From 10 to 49 93.59 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1 % of enterprises that apply some ICT security measure (0) From 50 to 249 98.21 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1 % of enterprises that apply some ICT security measure (0) 250 or more 100.00 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) Total 90.43 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 10 to 49 88.96 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 50 to 249 95.19 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) 250 or more 99.47 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) Total 22.50 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 10 to 49 17.42 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 50 to 249 37.92 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) 250 or more 58.04 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) Total 29.50 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 10 to 49 21.55 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 50 to 249 54.25 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) 250 or more 82.21 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) Total 36.00 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 10 to 49 29.50 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 50 to 249 54.24 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) 250 or more 87.47 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) Total 92.37 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 10 to 49 91.31 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 50 to 249 95.67 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) 250 or more 99.44 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.F % of enterprises applying network access control as an ICT security measure (1) Total 68.77 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 10 to 49 63.62 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 50 to 249 86.49 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.F % of enterprises applying network access control as an ICT security measure (1) 250 or more 95.90 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.G % of enterprises applying VPN as an ICT security measure (1) Total 55.92 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 10 to 49 47.81 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 50 to 249 84.21 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.G % of enterprises applying VPN as an ICT security measure (1) 250 or more 96.87 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) Total 37.15 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 10 to 49 29.22 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 50 to 249 62.86 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) 250 or more 85.57 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) Total 38.23 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 10 to 49 30.53 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 50 to 249 62.43 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) 250 or more 88.30 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) Total 30.40 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 10 to 49 23.73 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 50 to 249 48.84 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) 250 or more 84.47 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) Total 36.74 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 10 to 49 30.60 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 50 to 249 53.09 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) 250 or more 89.21 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) Total 59.76 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 10 to 49 54.33 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 50 to 249 77.39 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) 250 or more 92.86 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) Total 80.41 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 10 to 49 76.85 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 50 to 249 87.83 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) 250 or more 95.50 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) Total 42.17 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 10 to 49 36.30 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 50 to 249 50.77 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) 250 or more 79.86 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) Total 37.05 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 10 to 49 31.78 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 50 to 249 49.07 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) 250 or more 55.75 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) Total 28.45 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 10 to 49 20.21 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 50 to 249 55.43 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) 250 or more 86.55 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) Total 65.03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 10 to 49 62.83 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 50 to 249 62.25 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) 250 or more 83.55 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) Total 26.84 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 10 to 49 27.58 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 50 to 249 31.24 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) 250 or more 11.09 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) Total 8.13 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 10 to 49 9.59 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 50 to 249 6.52 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) 250 or more 5.36 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5 % of enterprises that have experienced an ICT security incident (0) Total 13.86 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5 % of enterprises that have experienced an ICT security incident (0) From 10 to 49 10.81 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5 % of enterprises that have experienced an ICT security incident (0) From 50 to 249 24.66 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5 % of enterprises that have experienced an ICT security incident (0) 250 or more 32.03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) Total 77.03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 10 to 49 73.87 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 50 to 249 80.80 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) 250 or more 87.03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) Total 19.81 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 10 to 49 20.70 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 50 to 249 14.98 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) 250 or more 29.54 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) Total 18.37 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 10 to 49 24.75 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 50 to 249 6.55 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) 250 or more 11.97 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) Total 20.13 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 10 to 49 24.58 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 50 to 249 12.23 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) 250 or more 14.60 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) Total 9.53 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 10 to 49 11.18 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 50 to 249 5.96 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) 250 or more 9.63 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) Total 2.10 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 10 to 49 1.46 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 50 to 249 3.14 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) 250 or more 3.17 1.5. Energy and water (CNAE 35-39) H.1 % of enterprises that apply some ICT security measure (0) Total 95.91 1.5. Energy and water (CNAE 35-39) H.1 % of enterprises that apply some ICT security measure (0) From 10 to 49 94.47 1.5. Energy and water (CNAE 35-39) H.1 % of enterprises that apply some ICT security measure (0) From 50 to 249 100.00 1.5. Energy and water (CNAE 35-39) H.1 % of enterprises that apply some ICT security measure (0) 250 or more 100.00 1.5. Energy and water (CNAE 35-39) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) Total 95.15 1.5. Energy and water (CNAE 35-39) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 10 to 49 94.13 1.5. Energy and water (CNAE 35-39) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 50 to 249 97.11 1.5. Energy and water (CNAE 35-39) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) 250 or more 100.00 1.5. Energy and water (CNAE 35-39) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) Total 24.72 1.5. Energy and water (CNAE 35-39) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 10 to 49 19.11 1.5. Energy and water (CNAE 35-39) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 50 to 249 34.11 1.5. Energy and water (CNAE 35-39) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) 250 or more 55.16 1.5. Energy and water (CNAE 35-39) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) Total 42.11 1.5. Energy and water (CNAE 35-39) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 10 to 49 35.21 1.5. Energy and water (CNAE 35-39) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 50 to 249 53.69 1.5. Energy and water (CNAE 35-39) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) 250 or more 79.49 1.5. Energy and water (CNAE 35-39) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) Total 51.21 1.5. Energy and water (CNAE 35-39) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 10 to 49 45.96 1.5. Energy and water (CNAE 35-39) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 50 to 249 59.22 1.5. Energy and water (CNAE 35-39) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) 250 or more 81.74 1.5. Energy and water (CNAE 35-39) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) Total 92.76 1.5. Energy and water (CNAE 35-39) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 10 to 49 91.10 1.5. Energy and water (CNAE 35-39) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 50 to 249 97.48 1.5. Energy and water (CNAE 35-39) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) 250 or more 96.62 1.5. Energy and water (CNAE 35-39) H.1.F % of enterprises applying network access control as an ICT security measure (1) Total 78.96 1.5. Energy and water (CNAE 35-39) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 10 to 49 75.16 1.5. Energy and water (CNAE 35-39) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 50 to 249 86.72 1.5. Energy and water (CNAE 35-39) H.1.F % of enterprises applying network access control as an ICT security measure (1) 250 or more 95.89 1.5. Energy and water (CNAE 35-39) H.1.G % of enterprises applying VPN as an ICT security measure (1) Total 57.75 1.5. Energy and water (CNAE 35-39) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 10 to 49 50.49 1.5. Energy and water (CNAE 35-39) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 50 to 249 70.58 1.5. Energy and water (CNAE 35-39) H.1.G % of enterprises applying VPN as an ICT security measure (1) 250 or more 95.35 1.5. Energy and water (CNAE 35-39) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) Total 45.06 1.5. Energy and water (CNAE 35-39) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 10 to 49 36.62 1.5. Energy and water (CNAE 35-39) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 50 to 249 60.76 1.5. Energy and water (CNAE 35-39) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) 250 or more 86.75 1.5. Energy and water (CNAE 35-39) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) Total 43.45 1.5. Energy and water (CNAE 35-39) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 10 to 49 35.45 1.5. Energy and water (CNAE 35-39) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 50 to 249 55.59 1.5. Energy and water (CNAE 35-39) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) 250 or more 90.37 1.5. Energy and water (CNAE 35-39) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) Total 35.83 1.5. Energy and water (CNAE 35-39) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 10 to 49 27.65 1.5. Energy and water (CNAE 35-39) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 50 to 249 49.50 1.5. Energy and water (CNAE 35-39) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) 250 or more 80.27 1.5. Energy and water (CNAE 35-39) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) Total 45.02 1.5. Energy and water (CNAE 35-39) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 10 to 49 38.80 1.5. Energy and water (CNAE 35-39) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 50 to 249 53.26 1.5. Energy and water (CNAE 35-39) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) 250 or more 84.62 1.5. Energy and water (CNAE 35-39) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) Total 67.10 1.5. Energy and water (CNAE 35-39) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 10 to 49 60.86 1.5. Energy and water (CNAE 35-39) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 50 to 249 80.92 1.5. Energy and water (CNAE 35-39) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) 250 or more 91.84 1.5. Energy and water (CNAE 35-39) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) Total 82.42 1.5. Energy and water (CNAE 35-39) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 10 to 49 78.00 1.5. Energy and water (CNAE 35-39) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 50 to 249 89.75 1.5. Energy and water (CNAE 35-39) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) 250 or more 94.14 1.5. Energy and water (CNAE 35-39) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) Total 53.18 1.5. Energy and water (CNAE 35-39) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 10 to 49 50.21 1.5. Energy and water (CNAE 35-39) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 50 to 249 52.21 1.5. Energy and water (CNAE 35-39) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) 250 or more 75.02 1.5. Energy and water (CNAE 35-39) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) Total 41.76 1.5. Energy and water (CNAE 35-39) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 10 to 49 37.96 1.5. Energy and water (CNAE 35-39) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 50 to 249 42.23 1.5. Energy and water (CNAE 35-39) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) 250 or more 65.65 1.5. Energy and water (CNAE 35-39) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) Total 39.11 1.5. Energy and water (CNAE 35-39) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 10 to 49 30.50 1.5. Energy and water (CNAE 35-39) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 50 to 249 56.84 1.5. Energy and water (CNAE 35-39) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) 250 or more 81.94 1.5. Energy and water (CNAE 35-39) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) Total 72.96 1.5. Energy and water (CNAE 35-39) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 10 to 49 73.34 1.5. Energy and water (CNAE 35-39) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 50 to 249 70.58 1.5. Energy and water (CNAE 35-39) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) 250 or more 75.91 1.5. Energy and water (CNAE 35-39) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) Total 15.32 1.5. Energy and water (CNAE 35-39) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 10 to 49 18.41 1.5. Energy and water (CNAE 35-39) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 50 to 249 9.17 1.5. Energy and water (CNAE 35-39) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) 250 or more 14.71 1.5. Energy and water (CNAE 35-39) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) Total 11.73 1.5. Energy and water (CNAE 35-39) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 10 to 49 8.25 1.5. Energy and water (CNAE 35-39) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 50 to 249 20.25 1.5. Energy and water (CNAE 35-39) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) 250 or more 9.38 1.5. Energy and water (CNAE 35-39) H.5 % of enterprises that have experienced an ICT security incident (0) Total 17.42 1.5. Energy and water (CNAE 35-39) H.5 % of enterprises that have experienced an ICT security incident (0) From 10 to 49 12.06 1.5. Energy and water (CNAE 35-39) H.5 % of enterprises that have experienced an ICT security incident (0) From 50 to 249 31.07 1.5. Energy and water (CNAE 35-39) H.5 % of enterprises that have experienced an ICT security incident (0) 250 or more 37.01 1.5. Energy and water (CNAE 35-39) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) Total 64.67 1.5. Energy and water (CNAE 35-39) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 10 to 49 61.63 1.5. Energy and water (CNAE 35-39) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 50 to 249 64.35 1.5. Energy and water (CNAE 35-39) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) 250 or more 75.82 1.5. Energy and water (CNAE 35-39) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) Total 28.34 1.5. Energy and water (CNAE 35-39) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 10 to 49 18.19 1.5. Energy and water (CNAE 35-39) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 50 to 249 39.72 1.5. Energy and water (CNAE 35-39) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) 250 or more 37.38 1.5. Energy and water (CNAE 35-39) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) Total 17.68 1.5. Energy and water (CNAE 35-39) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 10 to 49 19.49 1.5. Energy and water (CNAE 35-39) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 50 to 249 16.61 1.5. Energy and water (CNAE 35-39) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) 250 or more 13.84 1.5. Energy and water (CNAE 35-39) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) Total 16.39 1.5. Energy and water (CNAE 35-39) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 10 to 49 24.15 1.5. Energy and water (CNAE 35-39) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 50 to 249 4.33 1.5. Energy and water (CNAE 35-39) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) 250 or more 17.13 1.5. Energy and water (CNAE 35-39) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) Total 10.27 1.5. Energy and water (CNAE 35-39) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 10 to 49 11.99 1.5. Energy and water (CNAE 35-39) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 50 to 249 1.88 1.5. Energy and water (CNAE 35-39) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) 250 or more 23.42 1.5. Energy and water (CNAE 35-39) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) Total 2.12 1.5. Energy and water (CNAE 35-39) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 10 to 49 0.00 1.5. Energy and water (CNAE 35-39) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 50 to 249 0.00 1.5. Energy and water (CNAE 35-39) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) 250 or more 14.19 2. Total Construction (CNAE 41-43) H.1 % of enterprises that apply some ICT security measure (0) Total 87.38 2. Total Construction (CNAE 41-43) H.1 % of enterprises that apply some ICT security measure (0) From 10 to 49 86.86 2. Total Construction (CNAE 41-43) H.1 % of enterprises that apply some ICT security measure (0) From 50 to 249 91.02 2. Total Construction (CNAE 41-43) H.1 % of enterprises that apply some ICT security measure (0) 250 or more 99.01 2. Total Construction (CNAE 41-43) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) Total 89.11 2. Total Construction (CNAE 41-43) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 10 to 49 88.57 2. Total Construction (CNAE 41-43) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 50 to 249 92.78 2. Total Construction (CNAE 41-43) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) 250 or more 99.38 2. Total Construction (CNAE 41-43) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) Total 20.30 2. Total Construction (CNAE 41-43) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 10 to 49 19.64 2. Total Construction (CNAE 41-43) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 50 to 249 23.35 2. Total Construction (CNAE 41-43) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) 250 or more 48.92 2. Total Construction (CNAE 41-43) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) Total 24.89 2. Total Construction (CNAE 41-43) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 10 to 49 23.00 2. Total Construction (CNAE 41-43) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 50 to 249 36.44 2. Total Construction (CNAE 41-43) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) 250 or more 73.55 2. Total Construction (CNAE 41-43) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) Total 30.72 2. Total Construction (CNAE 41-43) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 10 to 49 29.55 2. Total Construction (CNAE 41-43) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 50 to 249 36.96 2. Total Construction (CNAE 41-43) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) 250 or more 71.01 2. Total Construction (CNAE 41-43) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) Total 87.00 2. Total Construction (CNAE 41-43) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 10 to 49 86.50 2. Total Construction (CNAE 41-43) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 50 to 249 90.28 2. Total Construction (CNAE 41-43) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) 250 or more 97.33 2. Total Construction (CNAE 41-43) H.1.F % of enterprises applying network access control as an ICT security measure (1) Total 54.10 2. Total Construction (CNAE 41-43) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 10 to 49 52.07 2. Total Construction (CNAE 41-43) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 50 to 249 67.95 2. Total Construction (CNAE 41-43) H.1.F % of enterprises applying network access control as an ICT security measure (1) 250 or more 91.58 2. Total Construction (CNAE 41-43) H.1.G % of enterprises applying VPN as an ICT security measure (1) Total 34.88 2. Total Construction (CNAE 41-43) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 10 to 49 31.30 2. Total Construction (CNAE 41-43) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 50 to 249 60.34 2. Total Construction (CNAE 41-43) H.1.G % of enterprises applying VPN as an ICT security measure (1) 250 or more 88.72 2. Total Construction (CNAE 41-43) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) Total 25.04 2. Total Construction (CNAE 41-43) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 10 to 49 23.46 2. Total Construction (CNAE 41-43) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 50 to 249 33.83 2. Total Construction (CNAE 41-43) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) 250 or more 76.33 2. Total Construction (CNAE 41-43) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) Total 19.36 2. Total Construction (CNAE 41-43) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 10 to 49 17.05 2. Total Construction (CNAE 41-43) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 50 to 249 33.96 2. Total Construction (CNAE 41-43) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) 250 or more 74.39 2. Total Construction (CNAE 41-43) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) Total 13.06 2. Total Construction (CNAE 41-43) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 10 to 49 11.07 2. Total Construction (CNAE 41-43) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 50 to 249 25.12 2. Total Construction (CNAE 41-43) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) 250 or more 67.01 2. Total Construction (CNAE 41-43) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) Total 20.67 2. Total Construction (CNAE 41-43) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 10 to 49 18.97 2. Total Construction (CNAE 41-43) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 50 to 249 30.55 2. Total Construction (CNAE 41-43) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) 250 or more 71.40 2. Total Construction (CNAE 41-43) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) Total 52.03 2. Total Construction (CNAE 41-43) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 10 to 49 51.06 2. Total Construction (CNAE 41-43) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 50 to 249 57.07 2. Total Construction (CNAE 41-43) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) 250 or more 87.20 2. Total Construction (CNAE 41-43) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) Total 65.11 2. Total Construction (CNAE 41-43) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 10 to 49 61.80 2. Total Construction (CNAE 41-43) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 50 to 249 86.62 2. Total Construction (CNAE 41-43) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) 250 or more 90.90 2. Total Construction (CNAE 41-43) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) Total 40.78 2. Total Construction (CNAE 41-43) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 10 to 49 40.19 2. Total Construction (CNAE 41-43) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 50 to 249 41.89 2. Total Construction (CNAE 41-43) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) 250 or more 65.86 2. Total Construction (CNAE 41-43) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) Total 38.17 2. Total Construction (CNAE 41-43) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 10 to 49 38.33 2. Total Construction (CNAE 41-43) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 50 to 249 34.39 2. Total Construction (CNAE 41-43) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) 250 or more 57.14 2. Total Construction (CNAE 41-43) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) Total 20.07 2. Total Construction (CNAE 41-43) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 10 to 49 19.13 2. Total Construction (CNAE 41-43) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 50 to 249 24.59 2. Total Construction (CNAE 41-43) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) 250 or more 66.55 2. Total Construction (CNAE 41-43) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) Total 64.97 2. Total Construction (CNAE 41-43) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 10 to 49 63.55 2. Total Construction (CNAE 41-43) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 50 to 249 71.17 2. Total Construction (CNAE 41-43) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) 250 or more 81.13 2. Total Construction (CNAE 41-43) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) Total 26.55 2. Total Construction (CNAE 41-43) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 10 to 49 27.42 2. Total Construction (CNAE 41-43) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 50 to 249 23.36 2. Total Construction (CNAE 41-43) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) 250 or more 13.72 2. Total Construction (CNAE 41-43) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) Total 8.48 2. Total Construction (CNAE 41-43) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 10 to 49 9.03 2. Total Construction (CNAE 41-43) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 50 to 249 5.46 2. Total Construction (CNAE 41-43) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) 250 or more 5.15 2. Total Construction (CNAE 41-43) H.5 % of enterprises that have experienced an ICT security incident (0) Total 12.85 2. Total Construction (CNAE 41-43) H.5 % of enterprises that have experienced an ICT security incident (0) From 10 to 49 12.43 2. Total Construction (CNAE 41-43) H.5 % of enterprises that have experienced an ICT security incident (0) From 50 to 249 13.98 2. Total Construction (CNAE 41-43) H.5 % of enterprises that have experienced an ICT security incident (0) 250 or more 44.42 2. Total Construction (CNAE 41-43) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) Total 74.03 2. Total Construction (CNAE 41-43) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 10 to 49 74.44 2. Total Construction (CNAE 41-43) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 50 to 249 71.12 2. Total Construction (CNAE 41-43) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) 250 or more 72.99 2. Total Construction (CNAE 41-43) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) Total 14.74 2. Total Construction (CNAE 41-43) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 10 to 49 14.96 2. Total Construction (CNAE 41-43) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 50 to 249 11.66 2. Total Construction (CNAE 41-43) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) 250 or more 19.92 2. Total Construction (CNAE 41-43) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) Total 22.34 2. Total Construction (CNAE 41-43) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 10 to 49 21.17 2. Total Construction (CNAE 41-43) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 50 to 249 33.46 2. Total Construction (CNAE 41-43) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) 250 or more 15.15 2. Total Construction (CNAE 41-43) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) Total 21.77 2. Total Construction (CNAE 41-43) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 10 to 49 22.69 2. Total Construction (CNAE 41-43) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 50 to 249 16.54 2. Total Construction (CNAE 41-43) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) 250 or more 14.06 2. Total Construction (CNAE 41-43) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) Total 7.86 2. Total Construction (CNAE 41-43) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 10 to 49 6.42 2. Total Construction (CNAE 41-43) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 50 to 249 16.82 2. Total Construction (CNAE 41-43) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) 250 or more 16.85 2. Total Construction (CNAE 41-43) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) Total 6.35 2. Total Construction (CNAE 41-43) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 10 to 49 5.92 2. Total Construction (CNAE 41-43) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 50 to 249 10.10 2. Total Construction (CNAE 41-43) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) 250 or more 4.85 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1 % of enterprises that apply some ICT security measure (0) Total 92.08 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1 % of enterprises that apply some ICT security measure (0) From 10 to 49 91.24 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1 % of enterprises that apply some ICT security measure (0) From 50 to 249 95.05 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1 % of enterprises that apply some ICT security measure (0) 250 or more 98.45 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) Total 91.99 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 10 to 49 90.92 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 50 to 249 95.97 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) 250 or more 98.20 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) Total 22.96 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 10 to 49 19.65 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 50 to 249 33.64 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) 250 or more 49.17 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) Total 39.01 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 10 to 49 34.11 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 50 to 249 54.81 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) 250 or more 77.66 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) Total 45.42 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 10 to 49 41.04 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 50 to 249 59.84 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) 250 or more 78.69 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) Total 92.04 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 10 to 49 91.23 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 50 to 249 94.84 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) 250 or more 97.71 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.F % of enterprises applying network access control as an ICT security measure (1) Total 73.43 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 10 to 49 70.24 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 50 to 249 84.59 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.F % of enterprises applying network access control as an ICT security measure (1) 250 or more 95.03 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.G % of enterprises applying VPN as an ICT security measure (1) Total 57.46 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 10 to 49 52.69 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 50 to 249 74.21 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.G % of enterprises applying VPN as an ICT security measure (1) 250 or more 89.59 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) Total 44.73 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 10 to 49 40.07 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 50 to 249 59.98 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) 250 or more 80.72 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) Total 43.06 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 10 to 49 37.68 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 50 to 249 61.15 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) 250 or more 82.68 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) Total 35.76 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 10 to 49 30.80 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 50 to 249 51.67 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) 250 or more 75.38 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) Total 39.98 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 10 to 49 35.04 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 50 to 249 55.96 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) 250 or more 78.88 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) Total 68.22 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 10 to 49 65.39 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 50 to 249 77.51 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) 250 or more 89.91 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) Total 80.15 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 10 to 49 78.14 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 50 to 249 85.17 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) 250 or more 93.15 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) Total 47.67 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 10 to 49 43.64 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 50 to 249 57.59 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) 250 or more 74.63 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) Total 41.65 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 10 to 49 38.22 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 50 to 249 51.38 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) 250 or more 60.12 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) Total 36.71 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 10 to 49 32.36 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 50 to 249 50.73 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) 250 or more 76.21 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) Total 72.48 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 10 to 49 69.85 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 50 to 249 77.56 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) 250 or more 83.55 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) Total 17.32 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 10 to 49 18.55 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 50 to 249 15.47 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) 250 or more 10.65 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) Total 10.20 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 10 to 49 11.60 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 50 to 249 6.97 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) 250 or more 5.80 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5 % of enterprises that have experienced an ICT security incident (0) Total 17.19 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5 % of enterprises that have experienced an ICT security incident (0) From 10 to 49 15.02 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5 % of enterprises that have experienced an ICT security incident (0) From 50 to 249 24.78 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5 % of enterprises that have experienced an ICT security incident (0) 250 or more 34.33 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) Total 72.65 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 10 to 49 70.99 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 50 to 249 76.23 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) 250 or more 78.22 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) Total 23.47 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 10 to 49 23.08 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 50 to 249 24.67 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) 250 or more 23.73 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) Total 21.65 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 10 to 49 20.99 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 50 to 249 24.46 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) 250 or more 19.59 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) Total 16.64 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 10 to 49 17.68 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 50 to 249 14.09 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) 250 or more 14.10 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) Total 8.70 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 10 to 49 7.85 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 50 to 249 9.97 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) 250 or more 13.29 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) Total 6.04 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 10 to 49 5.39 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 50 to 249 7.09 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) 250 or more 9.26 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1 % of enterprises that apply some ICT security measure (0) Total 92.63 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1 % of enterprises that apply some ICT security measure (0) From 10 to 49 91.97 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1 % of enterprises that apply some ICT security measure (0) From 50 to 249 95.86 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1 % of enterprises that apply some ICT security measure (0) 250 or more 97.59 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) Total 90.94 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 10 to 49 89.89 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 50 to 249 95.87 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) 250 or more 98.17 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) Total 21.98 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 10 to 49 19.37 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 50 to 249 31.61 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) 250 or more 53.86 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) Total 31.40 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 10 to 49 27.00 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 50 to 249 49.46 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) 250 or more 75.52 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) Total 37.54 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 10 to 49 33.52 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 50 to 249 54.26 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) 250 or more 76.97 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) Total 91.23 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 10 to 49 90.74 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 50 to 249 92.89 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) 250 or more 97.76 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.F % of enterprises applying network access control as an ICT security measure (1) Total 72.10 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 10 to 49 69.44 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 50 to 249 83.55 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.F % of enterprises applying network access control as an ICT security measure (1) 250 or more 95.85 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.G % of enterprises applying VPN as an ICT security measure (1) Total 54.88 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 10 to 49 50.32 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 50 to 249 75.36 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.G % of enterprises applying VPN as an ICT security measure (1) 250 or more 91.60 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) Total 38.34 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 10 to 49 33.77 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 50 to 249 57.85 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) 250 or more 80.22 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) Total 36.48 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 10 to 49 31.27 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 50 to 249 59.09 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) 250 or more 82.55 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) Total 30.41 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 10 to 49 26.40 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 50 to 249 46.51 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) 250 or more 72.61 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) Total 34.86 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 10 to 49 31.00 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 50 to 249 50.13 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) 250 or more 76.88 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) Total 66.26 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 10 to 49 64.17 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 50 to 249 74.18 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) 250 or more 90.60 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) Total 77.24 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 10 to 49 75.12 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 50 to 249 84.45 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) 250 or more 93.69 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) Total 45.04 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 10 to 49 42.38 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 50 to 249 52.75 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) 250 or more 71.06 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) Total 36.20 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 10 to 49 33.31 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 50 to 249 46.48 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) 250 or more 56.48 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) Total 31.21 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 10 to 49 28.18 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 50 to 249 42.72 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) 250 or more 71.10 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) Total 68.58 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 10 to 49 66.71 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 50 to 249 72.12 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) 250 or more 81.96 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) Total 18.95 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 10 to 49 19.66 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 50 to 249 17.97 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) 250 or more 12.83 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) Total 12.47 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 10 to 49 13.63 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 50 to 249 9.92 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) 250 or more 5.21 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5 % of enterprises that have experienced an ICT security incident (0) Total 14.87 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5 % of enterprises that have experienced an ICT security incident (0) From 10 to 49 12.71 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5 % of enterprises that have experienced an ICT security incident (0) From 50 to 249 24.33 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5 % of enterprises that have experienced an ICT security incident (0) 250 or more 36.90 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) Total 76.86 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 10 to 49 74.90 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 50 to 249 81.75 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) 250 or more 82.34 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) Total 20.55 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 10 to 49 20.24 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 50 to 249 20.72 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) 250 or more 23.37 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) Total 17.43 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 10 to 49 15.33 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 50 to 249 23.81 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) 250 or more 19.35 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) Total 14.16 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 10 to 49 13.69 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 50 to 249 14.40 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) 250 or more 18.66 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) Total 5.61 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 10 to 49 4.66 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 50 to 249 7.72 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) 250 or more 9.11 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) Total 3.91 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 10 to 49 3.19 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 50 to 249 5.35 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) 250 or more 7.14 3.2. Transport and storage (CNAE 49-53) H.1 % of enterprises that apply some ICT security measure (0) Total 91.58 3.2. Transport and storage (CNAE 49-53) H.1 % of enterprises that apply some ICT security measure (0) From 10 to 49 90.82 3.2. Transport and storage (CNAE 49-53) H.1 % of enterprises that apply some ICT security measure (0) From 50 to 249 94.61 3.2. Transport and storage (CNAE 49-53) H.1 % of enterprises that apply some ICT security measure (0) 250 or more 98.69 3.2. Transport and storage (CNAE 49-53) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) Total 88.78 3.2. Transport and storage (CNAE 49-53) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 10 to 49 87.43 3.2. Transport and storage (CNAE 49-53) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 50 to 249 94.25 3.2. Transport and storage (CNAE 49-53) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) 250 or more 98.91 3.2. Transport and storage (CNAE 49-53) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) Total 18.87 3.2. Transport and storage (CNAE 49-53) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 10 to 49 16.00 3.2. Transport and storage (CNAE 49-53) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 50 to 249 28.09 3.2. Transport and storage (CNAE 49-53) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) 250 or more 50.01 3.2. Transport and storage (CNAE 49-53) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) Total 32.54 3.2. Transport and storage (CNAE 49-53) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 10 to 49 28.82 3.2. Transport and storage (CNAE 49-53) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 50 to 249 43.16 3.2. Transport and storage (CNAE 49-53) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) 250 or more 78.38 3.2. Transport and storage (CNAE 49-53) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) Total 37.69 3.2. Transport and storage (CNAE 49-53) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 10 to 49 34.99 3.2. Transport and storage (CNAE 49-53) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 50 to 249 44.01 3.2. Transport and storage (CNAE 49-53) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) 250 or more 76.35 3.2. Transport and storage (CNAE 49-53) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) Total 89.50 3.2. Transport and storage (CNAE 49-53) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 10 to 49 88.26 3.2. Transport and storage (CNAE 49-53) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 50 to 249 94.77 3.2. Transport and storage (CNAE 49-53) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) 250 or more 98.13 3.2. Transport and storage (CNAE 49-53) H.1.F % of enterprises applying network access control as an ICT security measure (1) Total 64.85 3.2. Transport and storage (CNAE 49-53) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 10 to 49 61.55 3.2. Transport and storage (CNAE 49-53) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 50 to 249 76.53 3.2. Transport and storage (CNAE 49-53) H.1.F % of enterprises applying network access control as an ICT security measure (1) 250 or more 96.62 3.2. Transport and storage (CNAE 49-53) H.1.G % of enterprises applying VPN as an ICT security measure (1) Total 45.53 3.2. Transport and storage (CNAE 49-53) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 10 to 49 40.47 3.2. Transport and storage (CNAE 49-53) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 50 to 249 63.52 3.2. Transport and storage (CNAE 49-53) H.1.G % of enterprises applying VPN as an ICT security measure (1) 250 or more 93.86 3.2. Transport and storage (CNAE 49-53) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) Total 35.20 3.2. Transport and storage (CNAE 49-53) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 10 to 49 31.25 3.2. Transport and storage (CNAE 49-53) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 50 to 249 47.42 3.2. Transport and storage (CNAE 49-53) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) 250 or more 80.10 3.2. Transport and storage (CNAE 49-53) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) Total 29.98 3.2. Transport and storage (CNAE 49-53) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 10 to 49 25.24 3.2. Transport and storage (CNAE 49-53) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 50 to 249 45.16 3.2. Transport and storage (CNAE 49-53) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) 250 or more 81.77 3.2. Transport and storage (CNAE 49-53) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) Total 23.51 3.2. Transport and storage (CNAE 49-53) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 10 to 49 19.09 3.2. Transport and storage (CNAE 49-53) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 50 to 249 36.59 3.2. Transport and storage (CNAE 49-53) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) 250 or more 76.32 3.2. Transport and storage (CNAE 49-53) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) Total 30.34 3.2. Transport and storage (CNAE 49-53) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 10 to 49 26.51 3.2. Transport and storage (CNAE 49-53) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 50 to 249 40.56 3.2. Transport and storage (CNAE 49-53) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) 250 or more 80.35 3.2. Transport and storage (CNAE 49-53) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) Total 55.62 3.2. Transport and storage (CNAE 49-53) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 10 to 49 51.85 3.2. Transport and storage (CNAE 49-53) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 50 to 249 69.27 3.2. Transport and storage (CNAE 49-53) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) 250 or more 90.51 3.2. Transport and storage (CNAE 49-53) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) Total 72.84 3.2. Transport and storage (CNAE 49-53) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 10 to 49 70.37 3.2. Transport and storage (CNAE 49-53) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 50 to 249 77.01 3.2. Transport and storage (CNAE 49-53) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) 250 or more 93.67 3.2. Transport and storage (CNAE 49-53) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) Total 45.66 3.2. Transport and storage (CNAE 49-53) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 10 to 49 42.50 3.2. Transport and storage (CNAE 49-53) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 50 to 249 50.03 3.2. Transport and storage (CNAE 49-53) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) 250 or more 75.18 3.2. Transport and storage (CNAE 49-53) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) Total 38.23 3.2. Transport and storage (CNAE 49-53) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 10 to 49 35.29 3.2. Transport and storage (CNAE 49-53) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 50 to 249 44.05 3.2. Transport and storage (CNAE 49-53) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) 250 or more 60.35 3.2. Transport and storage (CNAE 49-53) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) Total 25.83 3.2. Transport and storage (CNAE 49-53) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 10 to 49 22.60 3.2. Transport and storage (CNAE 49-53) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 50 to 249 33.86 3.2. Transport and storage (CNAE 49-53) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) 250 or more 75.83 3.2. Transport and storage (CNAE 49-53) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) Total 65.49 3.2. Transport and storage (CNAE 49-53) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 10 to 49 62.10 3.2. Transport and storage (CNAE 49-53) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 50 to 249 72.74 3.2. Transport and storage (CNAE 49-53) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) 250 or more 78.05 3.2. Transport and storage (CNAE 49-53) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) Total 24.66 3.2. Transport and storage (CNAE 49-53) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 10 to 49 27.56 3.2. Transport and storage (CNAE 49-53) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 50 to 249 17.85 3.2. Transport and storage (CNAE 49-53) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) 250 or more 15.01 3.2. Transport and storage (CNAE 49-53) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) Total 9.85 3.2. Transport and storage (CNAE 49-53) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 10 to 49 10.34 3.2. Transport and storage (CNAE 49-53) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 50 to 249 9.40 3.2. Transport and storage (CNAE 49-53) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) 250 or more 6.94 3.2. Transport and storage (CNAE 49-53) H.5 % of enterprises that have experienced an ICT security incident (0) Total 13.13 3.2. Transport and storage (CNAE 49-53) H.5 % of enterprises that have experienced an ICT security incident (0) From 10 to 49 11.12 3.2. Transport and storage (CNAE 49-53) H.5 % of enterprises that have experienced an ICT security incident (0) From 50 to 249 20.52 3.2. Transport and storage (CNAE 49-53) H.5 % of enterprises that have experienced an ICT security incident (0) 250 or more 34.20 3.2. Transport and storage (CNAE 49-53) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) Total 74.18 3.2. Transport and storage (CNAE 49-53) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 10 to 49 73.95 3.2. Transport and storage (CNAE 49-53) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 50 to 249 73.03 3.2. Transport and storage (CNAE 49-53) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) 250 or more 78.90 3.2. Transport and storage (CNAE 49-53) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) Total 19.41 3.2. Transport and storage (CNAE 49-53) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 10 to 49 18.05 3.2. Transport and storage (CNAE 49-53) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 50 to 249 21.63 3.2. Transport and storage (CNAE 49-53) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) 250 or more 25.21 3.2. Transport and storage (CNAE 49-53) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) Total 17.18 3.2. Transport and storage (CNAE 49-53) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 10 to 49 15.16 3.2. Transport and storage (CNAE 49-53) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 50 to 249 22.12 3.2. Transport and storage (CNAE 49-53) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) 250 or more 21.78 3.2. Transport and storage (CNAE 49-53) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) Total 23.27 3.2. Transport and storage (CNAE 49-53) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 10 to 49 28.84 3.2. Transport and storage (CNAE 49-53) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 50 to 249 9.44 3.2. Transport and storage (CNAE 49-53) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) 250 or more 11.09 3.2. Transport and storage (CNAE 49-53) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) Total 10.56 3.2. Transport and storage (CNAE 49-53) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 10 to 49 9.94 3.2. Transport and storage (CNAE 49-53) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 50 to 249 11.55 3.2. Transport and storage (CNAE 49-53) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) 250 or more 13.24 3.2. Transport and storage (CNAE 49-53) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) Total 4.66 3.2. Transport and storage (CNAE 49-53) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 10 to 49 4.60 3.2. Transport and storage (CNAE 49-53) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 50 to 249 4.50 3.2. Transport and storage (CNAE 49-53) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) 250 or more 5.56 3.3. Accommodation services (CNAE 55) H.1 % of enterprises that apply some ICT security measure (0) Total 94.98 3.3. Accommodation services (CNAE 55) H.1 % of enterprises that apply some ICT security measure (0) From 10 to 49 94.84 3.3. Accommodation services (CNAE 55) H.1 % of enterprises that apply some ICT security measure (0) From 50 to 249 94.45 3.3. Accommodation services (CNAE 55) H.1 % of enterprises that apply some ICT security measure (0) 250 or more 100.00 3.3. Accommodation services (CNAE 55) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) Total 94.90 3.3. Accommodation services (CNAE 55) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 10 to 49 93.98 3.3. Accommodation services (CNAE 55) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 50 to 249 96.87 3.3. Accommodation services (CNAE 55) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) 250 or more 99.35 3.3. Accommodation services (CNAE 55) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) Total 25.40 3.3. Accommodation services (CNAE 55) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 10 to 49 18.21 3.3. Accommodation services (CNAE 55) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 50 to 249 42.28 3.3. Accommodation services (CNAE 55) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) 250 or more 53.61 3.3. Accommodation services (CNAE 55) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) Total 33.99 3.3. Accommodation services (CNAE 55) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 10 to 49 24.84 3.3. Accommodation services (CNAE 55) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 50 to 249 53.23 3.3. Accommodation services (CNAE 55) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) 250 or more 80.91 3.3. Accommodation services (CNAE 55) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) Total 39.12 3.3. Accommodation services (CNAE 55) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 10 to 49 30.43 3.3. Accommodation services (CNAE 55) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 50 to 249 57.63 3.3. Accommodation services (CNAE 55) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) 250 or more 82.48 3.3. Accommodation services (CNAE 55) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) Total 92.63 3.3. Accommodation services (CNAE 55) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 10 to 49 91.27 3.3. Accommodation services (CNAE 55) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 50 to 249 95.84 3.3. Accommodation services (CNAE 55) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) 250 or more 97.77 3.3. Accommodation services (CNAE 55) H.1.F % of enterprises applying network access control as an ICT security measure (1) Total 70.07 3.3. Accommodation services (CNAE 55) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 10 to 49 62.86 3.3. Accommodation services (CNAE 55) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 50 to 249 86.98 3.3. Accommodation services (CNAE 55) H.1.F % of enterprises applying network access control as an ICT security measure (1) 250 or more 98.47 3.3. Accommodation services (CNAE 55) H.1.G % of enterprises applying VPN as an ICT security measure (1) Total 52.10 3.3. Accommodation services (CNAE 55) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 10 to 49 42.88 3.3. Accommodation services (CNAE 55) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 50 to 249 72.35 3.3. Accommodation services (CNAE 55) H.1.G % of enterprises applying VPN as an ICT security measure (1) 250 or more 95.00 3.3. Accommodation services (CNAE 55) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) Total 40.16 3.3. Accommodation services (CNAE 55) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 10 to 49 30.91 3.3. Accommodation services (CNAE 55) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 50 to 249 60.24 3.3. Accommodation services (CNAE 55) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) 250 or more 84.32 3.3. Accommodation services (CNAE 55) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) Total 35.80 3.3. Accommodation services (CNAE 55) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 10 to 49 25.40 3.3. Accommodation services (CNAE 55) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 50 to 249 56.93 3.3. Accommodation services (CNAE 55) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) 250 or more 92.74 3.3. Accommodation services (CNAE 55) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) Total 32.86 3.3. Accommodation services (CNAE 55) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 10 to 49 25.28 3.3. Accommodation services (CNAE 55) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 50 to 249 47.85 3.3. Accommodation services (CNAE 55) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) 250 or more 76.33 3.3. Accommodation services (CNAE 55) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) Total 40.34 3.3. Accommodation services (CNAE 55) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 10 to 49 33.64 3.3. Accommodation services (CNAE 55) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 50 to 249 53.01 3.3. Accommodation services (CNAE 55) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) 250 or more 81.69 3.3. Accommodation services (CNAE 55) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) Total 69.92 3.3. Accommodation services (CNAE 55) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 10 to 49 66.65 3.3. Accommodation services (CNAE 55) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 50 to 249 75.20 3.3. Accommodation services (CNAE 55) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) 250 or more 94.60 3.3. Accommodation services (CNAE 55) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) Total 76.23 3.3. Accommodation services (CNAE 55) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 10 to 49 74.65 3.3. Accommodation services (CNAE 55) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 50 to 249 76.88 3.3. Accommodation services (CNAE 55) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) 250 or more 91.00 3.3. Accommodation services (CNAE 55) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) Total 49.89 3.3. Accommodation services (CNAE 55) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 10 to 49 46.74 3.3. Accommodation services (CNAE 55) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 50 to 249 53.86 3.3. Accommodation services (CNAE 55) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) 250 or more 68.74 3.3. Accommodation services (CNAE 55) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) Total 40.65 3.3. Accommodation services (CNAE 55) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 10 to 49 31.55 3.3. Accommodation services (CNAE 55) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 50 to 249 57.73 3.3. Accommodation services (CNAE 55) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) 250 or more 73.14 3.3. Accommodation services (CNAE 55) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) Total 40.89 3.3. Accommodation services (CNAE 55) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 10 to 49 34.02 3.3. Accommodation services (CNAE 55) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 50 to 249 55.33 3.3. Accommodation services (CNAE 55) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) 250 or more 77.79 3.3. Accommodation services (CNAE 55) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) Total 72.50 3.3. Accommodation services (CNAE 55) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 10 to 49 66.45 3.3. Accommodation services (CNAE 55) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 50 to 249 81.36 3.3. Accommodation services (CNAE 55) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) 250 or more 82.81 3.3. Accommodation services (CNAE 55) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) Total 20.32 3.3. Accommodation services (CNAE 55) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 10 to 49 27.12 3.3. Accommodation services (CNAE 55) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 50 to 249 8.78 3.3. Accommodation services (CNAE 55) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) 250 or more 14.50 3.3. Accommodation services (CNAE 55) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) Total 7.18 3.3. Accommodation services (CNAE 55) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 10 to 49 6.42 3.3. Accommodation services (CNAE 55) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 50 to 249 9.86 3.3. Accommodation services (CNAE 55) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) 250 or more 2.69 3.3. Accommodation services (CNAE 55) H.5 % of enterprises that have experienced an ICT security incident (0) Total 22.86 3.3. Accommodation services (CNAE 55) H.5 % of enterprises that have experienced an ICT security incident (0) From 10 to 49 19.74 3.3. Accommodation services (CNAE 55) H.5 % of enterprises that have experienced an ICT security incident (0) From 50 to 249 29.16 3.3. Accommodation services (CNAE 55) H.5 % of enterprises that have experienced an ICT security incident (0) 250 or more 41.10 3.3. Accommodation services (CNAE 55) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) Total 68.98 3.3. Accommodation services (CNAE 55) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 10 to 49 58.99 3.3. Accommodation services (CNAE 55) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 50 to 249 85.68 3.3. Accommodation services (CNAE 55) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) 250 or more 85.51 3.3. Accommodation services (CNAE 55) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) Total 30.78 3.3. Accommodation services (CNAE 55) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 10 to 49 30.47 3.3. Accommodation services (CNAE 55) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 50 to 249 32.43 3.3. Accommodation services (CNAE 55) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) 250 or more 27.17 3.3. Accommodation services (CNAE 55) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) Total 24.47 3.3. Accommodation services (CNAE 55) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 10 to 49 23.66 3.3. Accommodation services (CNAE 55) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 50 to 249 25.58 3.3. Accommodation services (CNAE 55) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) 250 or more 26.78 3.3. Accommodation services (CNAE 55) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) Total 20.78 3.3. Accommodation services (CNAE 55) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 10 to 49 23.78 3.3. Accommodation services (CNAE 55) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 50 to 249 14.37 3.3. Accommodation services (CNAE 55) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) 250 or more 21.00 3.3. Accommodation services (CNAE 55) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) Total 9.56 3.3. Accommodation services (CNAE 55) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 10 to 49 6.53 3.3. Accommodation services (CNAE 55) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 50 to 249 15.25 3.3. Accommodation services (CNAE 55) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) 250 or more 12.27 3.3. Accommodation services (CNAE 55) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) Total 7.59 3.3. Accommodation services (CNAE 55) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 10 to 49 6.65 3.3. Accommodation services (CNAE 55) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 50 to 249 7.92 3.3. Accommodation services (CNAE 55) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) 250 or more 13.71 3.4. Information and communications (CNAE 58-63) H.1 % of enterprises that apply some ICT security measure (0) Total 97.29 3.4. Information and communications (CNAE 58-63) H.1 % of enterprises that apply some ICT security measure (0) From 10 to 49 96.65 3.4. Information and communications (CNAE 58-63) H.1 % of enterprises that apply some ICT security measure (0) From 50 to 249 98.99 3.4. Information and communications (CNAE 58-63) H.1 % of enterprises that apply some ICT security measure (0) 250 or more 100.00 3.4. Information and communications (CNAE 58-63) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) Total 95.72 3.4. Information and communications (CNAE 58-63) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 10 to 49 94.33 3.4. Information and communications (CNAE 58-63) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 50 to 249 99.81 3.4. Information and communications (CNAE 58-63) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) 250 or more 99.67 3.4. Information and communications (CNAE 58-63) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) Total 33.83 3.4. Information and communications (CNAE 58-63) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 10 to 49 28.17 3.4. Information and communications (CNAE 58-63) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 50 to 249 47.48 3.4. Information and communications (CNAE 58-63) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) 250 or more 62.09 3.4. Information and communications (CNAE 58-63) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) Total 72.69 3.4. Information and communications (CNAE 58-63) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 10 to 49 68.17 3.4. Information and communications (CNAE 58-63) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 50 to 249 84.55 3.4. Information and communications (CNAE 58-63) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) 250 or more 91.34 3.4. Information and communications (CNAE 58-63) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) Total 76.10 3.4. Information and communications (CNAE 58-63) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 10 to 49 72.31 3.4. Information and communications (CNAE 58-63) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 50 to 249 85.60 3.4. Information and communications (CNAE 58-63) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) 250 or more 93.52 3.4. Information and communications (CNAE 58-63) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) Total 97.04 3.4. Information and communications (CNAE 58-63) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 10 to 49 96.72 3.4. Information and communications (CNAE 58-63) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 50 to 249 97.69 3.4. Information and communications (CNAE 58-63) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) 250 or more 99.13 3.4. Information and communications (CNAE 58-63) H.1.F % of enterprises applying network access control as an ICT security measure (1) Total 88.88 3.4. Information and communications (CNAE 58-63) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 10 to 49 86.57 3.4. Information and communications (CNAE 58-63) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 50 to 249 94.59 3.4. Information and communications (CNAE 58-63) H.1.F % of enterprises applying network access control as an ICT security measure (1) 250 or more 99.67 3.4. Information and communications (CNAE 58-63) H.1.G % of enterprises applying VPN as an ICT security measure (1) Total 83.07 3.4. Information and communications (CNAE 58-63) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 10 to 49 80.14 3.4. Information and communications (CNAE 58-63) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 50 to 249 90.45 3.4. Information and communications (CNAE 58-63) H.1.G % of enterprises applying VPN as an ICT security measure (1) 250 or more 96.42 3.4. Information and communications (CNAE 58-63) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) Total 72.84 3.4. Information and communications (CNAE 58-63) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 10 to 49 68.57 3.4. Information and communications (CNAE 58-63) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 50 to 249 84.01 3.4. Information and communications (CNAE 58-63) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) 250 or more 90.51 3.4. Information and communications (CNAE 58-63) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) Total 76.86 3.4. Information and communications (CNAE 58-63) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 10 to 49 72.74 3.4. Information and communications (CNAE 58-63) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 50 to 249 87.19 3.4. Information and communications (CNAE 58-63) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) 250 or more 95.72 3.4. Information and communications (CNAE 58-63) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) Total 68.48 3.4. Information and communications (CNAE 58-63) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 10 to 49 62.50 3.4. Information and communications (CNAE 58-63) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 50 to 249 84.19 3.4. Information and communications (CNAE 58-63) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) 250 or more 92.94 3.4. Information and communications (CNAE 58-63) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) Total 69.96 3.4. Information and communications (CNAE 58-63) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 10 to 49 65.23 3.4. Information and communications (CNAE 58-63) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 50 to 249 81.90 3.4. Information and communications (CNAE 58-63) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) 250 or more 91.27 3.4. Information and communications (CNAE 58-63) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) Total 89.07 3.4. Information and communications (CNAE 58-63) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 10 to 49 87.06 3.4. Information and communications (CNAE 58-63) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 50 to 249 94.58 3.4. Information and communications (CNAE 58-63) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) 250 or more 96.25 3.4. Information and communications (CNAE 58-63) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) Total 91.69 3.4. Information and communications (CNAE 58-63) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 10 to 49 89.92 3.4. Information and communications (CNAE 58-63) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 50 to 249 96.17 3.4. Information and communications (CNAE 58-63) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) 250 or more 97.41 3.4. Information and communications (CNAE 58-63) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) Total 59.16 3.4. Information and communications (CNAE 58-63) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 10 to 49 52.66 3.4. Information and communications (CNAE 58-63) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 50 to 249 73.85 3.4. Information and communications (CNAE 58-63) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) 250 or more 87.45 3.4. Information and communications (CNAE 58-63) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) Total 53.45 3.4. Information and communications (CNAE 58-63) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 10 to 49 50.04 3.4. Information and communications (CNAE 58-63) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 50 to 249 60.12 3.4. Information and communications (CNAE 58-63) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) 250 or more 72.36 3.4. Information and communications (CNAE 58-63) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) Total 68.10 3.4. Information and communications (CNAE 58-63) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 10 to 49 62.99 3.4. Information and communications (CNAE 58-63) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 50 to 249 80.94 3.4. Information and communications (CNAE 58-63) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) 250 or more 93.36 3.4. Information and communications (CNAE 58-63) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) Total 80.11 3.4. Information and communications (CNAE 58-63) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 10 to 49 77.68 3.4. Information and communications (CNAE 58-63) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 50 to 249 83.55 3.4. Information and communications (CNAE 58-63) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) 250 or more 92.96 3.4. Information and communications (CNAE 58-63) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) Total 12.95 3.4. Information and communications (CNAE 58-63) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 10 to 49 13.90 3.4. Information and communications (CNAE 58-63) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 50 to 249 12.91 3.4. Information and communications (CNAE 58-63) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) 250 or more 3.25 3.4. Information and communications (CNAE 58-63) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) Total 6.94 3.4. Information and communications (CNAE 58-63) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 10 to 49 8.42 3.4. Information and communications (CNAE 58-63) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 50 to 249 3.54 3.4. Information and communications (CNAE 58-63) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) 250 or more 3.79 3.4. Information and communications (CNAE 58-63) H.5 % of enterprises that have experienced an ICT security incident (0) Total 26.60 3.4. Information and communications (CNAE 58-63) H.5 % of enterprises that have experienced an ICT security incident (0) From 10 to 49 23.33 3.4. Information and communications (CNAE 58-63) H.5 % of enterprises that have experienced an ICT security incident (0) From 50 to 249 35.16 3.4. Information and communications (CNAE 58-63) H.5 % of enterprises that have experienced an ICT security incident (0) 250 or more 41.36 3.4. Information and communications (CNAE 58-63) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) Total 76.26 3.4. Information and communications (CNAE 58-63) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 10 to 49 74.19 3.4. Information and communications (CNAE 58-63) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 50 to 249 80.39 3.4. Information and communications (CNAE 58-63) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) 250 or more 79.72 3.4. Information and communications (CNAE 58-63) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) Total 34.65 3.4. Information and communications (CNAE 58-63) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 10 to 49 36.10 3.4. Information and communications (CNAE 58-63) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 50 to 249 33.19 3.4. Information and communications (CNAE 58-63) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) 250 or more 27.23 3.4. Information and communications (CNAE 58-63) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) Total 31.69 3.4. Information and communications (CNAE 58-63) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 10 to 49 37.68 3.4. Information and communications (CNAE 58-63) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 50 to 249 18.25 3.4. Information and communications (CNAE 58-63) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) 250 or more 26.98 3.4. Information and communications (CNAE 58-63) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) Total 24.19 3.4. Information and communications (CNAE 58-63) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 10 to 49 29.40 3.4. Information and communications (CNAE 58-63) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 50 to 249 13.46 3.4. Information and communications (CNAE 58-63) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) 250 or more 16.65 3.4. Information and communications (CNAE 58-63) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) Total 7.74 3.4. Information and communications (CNAE 58-63) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 10 to 49 9.00 3.4. Information and communications (CNAE 58-63) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 50 to 249 4.69 3.4. Information and communications (CNAE 58-63) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) 250 or more 7.53 3.4. Information and communications (CNAE 58-63) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) Total 7.73 3.4. Information and communications (CNAE 58-63) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 10 to 49 6.39 3.4. Information and communications (CNAE 58-63) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 50 to 249 8.79 3.4. Information and communications (CNAE 58-63) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) 250 or more 15.63 3.5. Real estate activities (CNAE 68) H.1 % of enterprises that apply some ICT security measure (0) Total 95.60 3.5. Real estate activities (CNAE 68) H.1 % of enterprises that apply some ICT security measure (0) From 10 to 49 95.15 3.5. Real estate activities (CNAE 68) H.1 % of enterprises that apply some ICT security measure (0) From 50 to 249 100.00 3.5. Real estate activities (CNAE 68) H.1 % of enterprises that apply some ICT security measure (0) 250 or more 100.00 3.5. Real estate activities (CNAE 68) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) Total 98.73 3.5. Real estate activities (CNAE 68) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 10 to 49 98.60 3.5. Real estate activities (CNAE 68) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 50 to 249 100.00 3.5. Real estate activities (CNAE 68) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) 250 or more 100.00 3.5. Real estate activities (CNAE 68) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) Total 34.59 3.5. Real estate activities (CNAE 68) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 10 to 49 34.11 3.5. Real estate activities (CNAE 68) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 50 to 249 33.43 3.5. Real estate activities (CNAE 68) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) 250 or more 67.29 3.5. Real estate activities (CNAE 68) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) Total 44.71 3.5. Real estate activities (CNAE 68) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 10 to 49 41.89 3.5. Real estate activities (CNAE 68) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 50 to 249 65.12 3.5. Real estate activities (CNAE 68) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) 250 or more 100.00 3.5. Real estate activities (CNAE 68) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) Total 56.95 3.5. Real estate activities (CNAE 68) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 10 to 49 54.03 3.5. Real estate activities (CNAE 68) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 50 to 249 80.88 3.5. Real estate activities (CNAE 68) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) 250 or more 100.00 3.5. Real estate activities (CNAE 68) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) Total 94.65 3.5. Real estate activities (CNAE 68) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 10 to 49 94.07 3.5. Real estate activities (CNAE 68) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 50 to 249 100.00 3.5. Real estate activities (CNAE 68) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) 250 or more 100.00 3.5. Real estate activities (CNAE 68) H.1.F % of enterprises applying network access control as an ICT security measure (1) Total 71.62 3.5. Real estate activities (CNAE 68) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 10 to 49 69.19 3.5. Real estate activities (CNAE 68) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 50 to 249 93.01 3.5. Real estate activities (CNAE 68) H.1.F % of enterprises applying network access control as an ICT security measure (1) 250 or more 100.00 3.5. Real estate activities (CNAE 68) H.1.G % of enterprises applying VPN as an ICT security measure (1) Total 55.01 3.5. Real estate activities (CNAE 68) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 10 to 49 50.94 3.5. Real estate activities (CNAE 68) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 50 to 249 92.55 3.5. Real estate activities (CNAE 68) H.1.G % of enterprises applying VPN as an ICT security measure (1) 250 or more 93.24 3.5. Real estate activities (CNAE 68) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) Total 55.88 3.5. Real estate activities (CNAE 68) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 10 to 49 52.63 3.5. Real estate activities (CNAE 68) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 50 to 249 87.50 3.5. Real estate activities (CNAE 68) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) 250 or more 78.46 3.5. Real estate activities (CNAE 68) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) Total 54.33 3.5. Real estate activities (CNAE 68) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 10 to 49 50.86 3.5. Real estate activities (CNAE 68) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 50 to 249 83.77 3.5. Real estate activities (CNAE 68) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) 250 or more 100.00 3.5. Real estate activities (CNAE 68) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) Total 35.98 3.5. Real estate activities (CNAE 68) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 10 to 49 31.69 3.5. Real estate activities (CNAE 68) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 50 to 249 73.48 3.5. Real estate activities (CNAE 68) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) 250 or more 87.28 3.5. Real estate activities (CNAE 68) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) Total 38.23 3.5. Real estate activities (CNAE 68) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 10 to 49 33.63 3.5. Real estate activities (CNAE 68) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 50 to 249 78.30 3.5. Real estate activities (CNAE 68) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) 250 or more 94.03 3.5. Real estate activities (CNAE 68) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) Total 67.34 3.5. Real estate activities (CNAE 68) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 10 to 49 65.51 3.5. Real estate activities (CNAE 68) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 50 to 249 81.27 3.5. Real estate activities (CNAE 68) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) 250 or more 100.00 3.5. Real estate activities (CNAE 68) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) Total 82.43 3.5. Real estate activities (CNAE 68) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 10 to 49 81.71 3.5. Real estate activities (CNAE 68) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 50 to 249 87.17 3.5. Real estate activities (CNAE 68) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) 250 or more 89.20 3.5. Real estate activities (CNAE 68) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) Total 53.51 3.5. Real estate activities (CNAE 68) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 10 to 49 50.77 3.5. Real estate activities (CNAE 68) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 50 to 249 71.08 3.5. Real estate activities (CNAE 68) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) 250 or more 82.08 3.5. Real estate activities (CNAE 68) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) Total 24.67 3.5. Real estate activities (CNAE 68) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 10 to 49 22.71 3.5. Real estate activities (CNAE 68) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 50 to 249 33.91 3.5. Real estate activities (CNAE 68) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) 250 or more 59.02 3.5. Real estate activities (CNAE 68) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) Total 33.89 3.5. Real estate activities (CNAE 68) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 10 to 49 29.65 3.5. Real estate activities (CNAE 68) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 50 to 249 70.26 3.5. Real estate activities (CNAE 68) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) 250 or more 100.00 3.5. Real estate activities (CNAE 68) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) Total 76.06 3.5. Real estate activities (CNAE 68) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 10 to 49 77.22 3.5. Real estate activities (CNAE 68) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 50 to 249 68.01 3.5. Real estate activities (CNAE 68) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) 250 or more 84.43 3.5. Real estate activities (CNAE 68) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) Total 9.41 3.5. Real estate activities (CNAE 68) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 10 to 49 6.38 3.5. Real estate activities (CNAE 68) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 50 to 249 23.70 3.5. Real estate activities (CNAE 68) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) 250 or more 11.53 3.5. Real estate activities (CNAE 68) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) Total 14.53 3.5. Real estate activities (CNAE 68) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 10 to 49 16.40 3.5. Real estate activities (CNAE 68) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 50 to 249 8.28 3.5. Real estate activities (CNAE 68) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) 250 or more 4.04 3.5. Real estate activities (CNAE 68) H.5 % of enterprises that have experienced an ICT security incident (0) Total 13.15 3.5. Real estate activities (CNAE 68) H.5 % of enterprises that have experienced an ICT security incident (0) From 10 to 49 11.64 3.5. Real estate activities (CNAE 68) H.5 % of enterprises that have experienced an ICT security incident (0) From 50 to 249 29.22 3.5. Real estate activities (CNAE 68) H.5 % of enterprises that have experienced an ICT security incident (0) 250 or more 20.72 3.5. Real estate activities (CNAE 68) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) Total 60.68 3.5. Real estate activities (CNAE 68) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 10 to 49 56.90 3.5. Real estate activities (CNAE 68) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 50 to 249 78.75 3.5. Real estate activities (CNAE 68) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) 250 or more 56.82 3.5. Real estate activities (CNAE 68) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) Total 19.13 3.5. Real estate activities (CNAE 68) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 10 to 49 19.60 3.5. Real estate activities (CNAE 68) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 50 to 249 19.59 3.5. Real estate activities (CNAE 68) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) 250 or more 0.00 3.5. Real estate activities (CNAE 68) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) Total 24.45 3.5. Real estate activities (CNAE 68) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 10 to 49 29.89 3.5. Real estate activities (CNAE 68) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 50 to 249 2.61 3.5. Real estate activities (CNAE 68) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) 250 or more 0.00 3.5. Real estate activities (CNAE 68) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) Total 14.84 3.5. Real estate activities (CNAE 68) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 10 to 49 15.69 3.5. Real estate activities (CNAE 68) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 50 to 249 12.93 3.5. Real estate activities (CNAE 68) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) 250 or more 0.00 3.5. Real estate activities (CNAE 68) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) Total 12.09 3.5. Real estate activities (CNAE 68) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 10 to 49 8.32 3.5. Real estate activities (CNAE 68) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 50 to 249 25.27 3.5. Real estate activities (CNAE 68) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) 250 or more 43.18 3.5. Real estate activities (CNAE 68) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) Total 2.34 3.5. Real estate activities (CNAE 68) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 10 to 49 0.00 3.5. Real estate activities (CNAE 68) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 50 to 249 7.51 3.5. Real estate activities (CNAE 68) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) 250 or more 43.18 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1 % of enterprises that apply some ICT security measure (0) Total 97.80 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1 % of enterprises that apply some ICT security measure (0) From 10 to 49 97.72 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1 % of enterprises that apply some ICT security measure (0) From 50 to 249 97.91 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1 % of enterprises that apply some ICT security measure (0) 250 or more 99.42 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) Total 93.79 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 10 to 49 92.79 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 50 to 249 98.21 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) 250 or more 99.66 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) Total 22.00 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 10 to 49 18.14 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 50 to 249 38.73 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) 250 or more 46.03 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) Total 46.95 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 10 to 49 41.27 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 50 to 249 70.39 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) 250 or more 87.11 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) Total 54.90 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 10 to 49 49.64 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 50 to 249 77.04 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) 250 or more 90.51 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) Total 95.64 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 10 to 49 95.32 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 50 to 249 96.72 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) 250 or more 98.90 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.F % of enterprises applying network access control as an ICT security measure (1) Total 84.69 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 10 to 49 82.17 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 50 to 249 96.45 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.F % of enterprises applying network access control as an ICT security measure (1) 250 or more 96.66 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.G % of enterprises applying VPN as an ICT security measure (1) Total 71.41 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 10 to 49 67.39 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 50 to 249 88.98 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.G % of enterprises applying VPN as an ICT security measure (1) 250 or more 95.85 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) Total 58.19 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 10 to 49 53.94 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 50 to 249 74.98 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) 250 or more 91.52 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) Total 58.06 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 10 to 49 52.93 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 50 to 249 79.44 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) 250 or more 93.50 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) Total 46.14 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 10 to 49 40.61 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 50 to 249 68.91 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) 250 or more 85.54 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) Total 51.28 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 10 to 49 45.45 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 50 to 249 75.86 3.6. Professional, scientific and technical activities (CNAE 69-75) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) 250 or more 90.45 3.6. Professional, scientific and technical activities (CNAE 69-75) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) Total 75.12 3.6. Professional, scientific and technical activities (CNAE 69-75) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 10 to 49 71.62 3.6. Professional, scientific and technical activities (CNAE 69-75) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 50 to 249 89.79 3.6. Professional, scientific and technical activities (CNAE 69-75) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) 250 or more 99.01 3.6. Professional, scientific and technical activities (CNAE 69-75) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) Total 86.51 3.6. Professional, scientific and technical activities (CNAE 69-75) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 10 to 49 84.95 3.6. Professional, scientific and technical activities (CNAE 69-75) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 50 to 249 92.54 3.6. Professional, scientific and technical activities (CNAE 69-75) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) 250 or more 91.02 3.6. Professional, scientific and technical activities (CNAE 69-75) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) Total 49.77 3.6. Professional, scientific and technical activities (CNAE 69-75) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 10 to 49 44.09 3.6. Professional, scientific and technical activities (CNAE 69-75) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 50 to 249 67.63 3.6. Professional, scientific and technical activities (CNAE 69-75) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) 250 or more 82.17 3.6. Professional, scientific and technical activities (CNAE 69-75) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) Total 46.25 3.6. Professional, scientific and technical activities (CNAE 69-75) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 10 to 49 41.89 3.6. Professional, scientific and technical activities (CNAE 69-75) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 50 to 249 61.78 3.6. Professional, scientific and technical activities (CNAE 69-75) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) 250 or more 63.97 3.6. Professional, scientific and technical activities (CNAE 69-75) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) Total 48.72 3.6. Professional, scientific and technical activities (CNAE 69-75) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 10 to 49 42.83 3.6. Professional, scientific and technical activities (CNAE 69-75) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 50 to 249 73.22 3.6. Professional, scientific and technical activities (CNAE 69-75) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) 250 or more 90.48 3.6. Professional, scientific and technical activities (CNAE 69-75) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) Total 76.29 3.6. Professional, scientific and technical activities (CNAE 69-75) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 10 to 49 73.54 3.6. Professional, scientific and technical activities (CNAE 69-75) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 50 to 249 83.52 3.6. Professional, scientific and technical activities (CNAE 69-75) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) 250 or more 83.75 3.6. Professional, scientific and technical activities (CNAE 69-75) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) Total 14.18 3.6. Professional, scientific and technical activities (CNAE 69-75) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 10 to 49 15.24 3.6. Professional, scientific and technical activities (CNAE 69-75) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 50 to 249 11.74 3.6. Professional, scientific and technical activities (CNAE 69-75) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) 250 or more 10.07 3.6. Professional, scientific and technical activities (CNAE 69-75) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) Total 9.53 3.6. Professional, scientific and technical activities (CNAE 69-75) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 10 to 49 11.22 3.6. Professional, scientific and technical activities (CNAE 69-75) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 50 to 249 4.74 3.6. Professional, scientific and technical activities (CNAE 69-75) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) 250 or more 6.17 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5 % of enterprises that have experienced an ICT security incident (0) Total 23.21 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5 % of enterprises that have experienced an ICT security incident (0) From 10 to 49 21.99 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5 % of enterprises that have experienced an ICT security incident (0) From 50 to 249 28.18 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5 % of enterprises that have experienced an ICT security incident (0) 250 or more 32.54 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) Total 66.67 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 10 to 49 66.03 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 50 to 249 67.06 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) 250 or more 75.97 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) Total 18.46 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 10 to 49 16.36 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 50 to 249 25.02 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) 250 or more 29.50 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) Total 16.21 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 10 to 49 15.31 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 50 to 249 20.17 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) 250 or more 16.61 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) Total 11.21 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 10 to 49 10.94 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 50 to 249 12.42 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) 250 or more 11.15 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) Total 10.47 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 10 to 49 8.59 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 50 to 249 17.97 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) 250 or more 14.40 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) Total 6.18 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 10 to 49 5.62 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 50 to 249 7.11 3.6. Professional, scientific and technical activities (CNAE 69-75) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) 250 or more 12.27 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1 % of enterprises that apply some ICT security measure (0) Total 80.23 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1 % of enterprises that apply some ICT security measure (0) From 10 to 49 76.85 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1 % of enterprises that apply some ICT security measure (0) From 50 to 249 88.65 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1 % of enterprises that apply some ICT security measure (0) 250 or more 97.57 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) Total 90.97 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 10 to 49 90.24 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 50 to 249 91.77 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) 250 or more 95.96 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) Total 20.66 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 10 to 49 18.28 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 50 to 249 23.03 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) 250 or more 37.70 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) Total 34.97 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 10 to 49 31.16 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 50 to 249 37.46 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) 250 or more 65.76 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) Total 42.88 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 10 to 49 39.53 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 50 to 249 46.66 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) 250 or more 65.68 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) Total 87.98 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 10 to 49 85.46 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 50 to 249 94.25 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) 250 or more 95.95 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.F % of enterprises applying network access control as an ICT security measure (1) Total 61.55 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 10 to 49 55.89 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 50 to 249 71.97 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.F % of enterprises applying network access control as an ICT security measure (1) 250 or more 89.18 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.G % of enterprises applying VPN as an ICT security measure (1) Total 42.82 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 10 to 49 36.67 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 50 to 249 52.66 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.G % of enterprises applying VPN as an ICT security measure (1) 250 or more 76.90 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) Total 35.37 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 10 to 49 30.86 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 50 to 249 39.13 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) 250 or more 69.53 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) Total 32.78 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 10 to 49 27.22 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 50 to 249 40.25 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) 250 or more 67.37 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) Total 28.21 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 10 to 49 23.44 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 50 to 249 32.84 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) 250 or more 62.74 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) Total 28.92 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 10 to 49 21.97 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 50 to 249 40.52 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) 250 or more 66.16 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) Total 62.29 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 10 to 49 59.40 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 50 to 249 66.74 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) 250 or more 78.78 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) Total 75.25 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 10 to 49 72.78 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 50 to 249 75.84 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) 250 or more 92.19 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) Total 40.92 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 10 to 49 36.08 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 50 to 249 45.24 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) 250 or more 66.95 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) Total 46.65 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 10 to 49 46.92 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 50 to 249 43.94 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) 250 or more 50.80 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) Total 28.17 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 10 to 49 23.72 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 50 to 249 34.78 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) 250 or more 64.19 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) Total 70.70 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 10 to 49 67.66 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 50 to 249 72.30 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) 250 or more 82.16 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) Total 18.90 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 10 to 49 19.72 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 50 to 249 22.13 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) 250 or more 9.95 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) Total 10.40 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 10 to 49 12.62 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 50 to 249 5.57 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) 250 or more 7.89 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5 % of enterprises that have experienced an ICT security incident (0) Total 13.43 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5 % of enterprises that have experienced an ICT security incident (0) From 10 to 49 11.48 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5 % of enterprises that have experienced an ICT security incident (0) From 50 to 249 16.60 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5 % of enterprises that have experienced an ICT security incident (0) 250 or more 28.32 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) Total 70.31 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 10 to 49 72.42 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 50 to 249 63.95 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) 250 or more 70.62 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) Total 28.87 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 10 to 49 33.97 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 50 to 249 21.07 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) 250 or more 16.55 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) Total 34.65 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 10 to 49 35.29 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 50 to 249 44.79 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) 250 or more 13.85 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) Total 17.99 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 10 to 49 19.28 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 50 to 249 20.21 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) 250 or more 7.65 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) Total 12.77 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 10 to 49 13.72 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 50 to 249 4.72 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) 250 or more 21.89 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) Total 10.85 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 10 to 49 11.83 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 50 to 249 11.12 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) 250 or more 5.48 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1 % of enterprises that apply some ICT security measure (0) Total 98.17 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1 % of enterprises that apply some ICT security measure (0) From 10 to 49 97.61 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1 % of enterprises that apply some ICT security measure (0) From 50 to 249 99.89 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1 % of enterprises that apply some ICT security measure (0) 250 or more 100.00 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) Total 97.45 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 10 to 49 96.62 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) From 50 to 249 100.00 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) 250 or more 99.64 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) Total 35.85 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 10 to 49 31.33 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) From 50 to 249 46.73 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) 250 or more 61.24 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) Total 72.09 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 10 to 49 68.64 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) From 50 to 249 80.37 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) 250 or more 91.63 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) Total 73.15 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 10 to 49 69.23 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) From 50 to 249 82.86 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) 250 or more 94.04 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) Total 97.09 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 10 to 49 96.80 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) From 50 to 249 97.68 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) 250 or more 99.06 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.F % of enterprises applying network access control as an ICT security measure (1) Total 88.47 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 10 to 49 86.07 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.F % of enterprises applying network access control as an ICT security measure (1) From 50 to 249 94.75 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.F % of enterprises applying network access control as an ICT security measure (1) 250 or more 99.64 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.G % of enterprises applying VPN as an ICT security measure (1) Total 82.14 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 10 to 49 78.77 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.G % of enterprises applying VPN as an ICT security measure (1) From 50 to 249 91.14 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.G % of enterprises applying VPN as an ICT security measure (1) 250 or more 97.12 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) Total 70.83 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 10 to 49 65.75 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) From 50 to 249 84.71 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) 250 or more 92.04 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) Total 75.05 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 10 to 49 70.44 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) From 50 to 249 87.34 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) 250 or more 95.74 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) Total 66.05 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 10 to 49 60.16 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) From 50 to 249 81.23 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) 250 or more 94.76 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) Total 68.30 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 10 to 49 63.53 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) From 50 to 249 80.46 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) 250 or more 92.13 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) Total 89.46 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 10 to 49 87.37 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) From 50 to 249 95.41 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.2 % of enterprises that make their employees aware of their ICT security obligations (1) 250 or more 97.17 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) Total 90.66 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 10 to 49 88.79 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) From 50 to 249 95.55 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) 250 or more 96.87 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) Total 55.75 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 10 to 49 47.58 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) From 50 to 249 75.07 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) 250 or more 91.34 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) Total 51.47 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 10 to 49 48.12 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) From 50 to 249 57.94 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) 250 or more 72.43 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) Total 66.44 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 10 to 49 59.59 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) From 50 to 249 86.32 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) 250 or more 92.57 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) Total 81.54 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 10 to 49 79.07 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) From 50 to 249 85.11 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) 250 or more 93.25 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) Total 12.74 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 10 to 49 13.96 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) From 50 to 249 11.60 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) 250 or more 4.36 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) Total 5.72 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 10 to 49 6.97 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) From 50 to 249 3.29 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) 250 or more 2.39 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5 % of enterprises that have experienced an ICT security incident (0) Total 26.43 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5 % of enterprises that have experienced an ICT security incident (0) From 10 to 49 24.71 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5 % of enterprises that have experienced an ICT security incident (0) From 50 to 249 30.71 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5 % of enterprises that have experienced an ICT security incident (0) 250 or more 36.05 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) Total 74.95 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 10 to 49 74.67 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) From 50 to 249 75.82 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) 250 or more 74.91 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) Total 34.95 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 10 to 49 37.31 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) From 50 to 249 30.32 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) 250 or more 25.32 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) Total 32.09 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 10 to 49 37.78 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) From 50 to 249 17.46 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) 250 or more 22.28 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) Total 23.34 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 10 to 49 27.34 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) From 50 to 249 13.39 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) 250 or more 15.20 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) Total 9.68 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 10 to 49 9.98 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) From 50 to 249 8.93 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) 250 or more 9.00 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) Total 7.99 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 10 to 49 5.96 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) From 50 to 249 11.62 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) 250 or more 17.57