Activity grouping (except CNAE 56, 64-66 and 95.1);Main variables;Size of the enterprise;Total Total Enterprises;H.1 % of enterprises that apply some ICT security measure (0);Total;91.27 Total Enterprises;H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;90.28 Total Enterprises;H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;95.24 Total Enterprises;H.1 % of enterprises that apply some ICT security measure (0);250 or more;98.94 Total Enterprises;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;91.09 Total Enterprises;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;89.91 Total Enterprises;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;95.66 Total Enterprises;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;98.76 Total Enterprises;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;22.22 Total Enterprises;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;19.04 Total Enterprises;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;32.94 Total Enterprises;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;50.18 Total Enterprises;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;34.55 Total Enterprises;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;29.35 Total Enterprises;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;52.29 Total Enterprises;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;79.22 Total Enterprises;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;40.41 Total Enterprises;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;35.98 Total Enterprises;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;55.37 Total Enterprises;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;79.48 Total Enterprises;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;91.29 Total Enterprises;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;90.35 Total Enterprises;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;94.83 Total Enterprises;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;97.82 Total Enterprises;H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;69.59 Total Enterprises;H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;65.93 Total Enterprises;H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;83.36 Total Enterprises;H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;95.40 Total Enterprises;H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;52.30 Total Enterprises;H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;46.52 Total Enterprises;H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;74.43 Total Enterprises;H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;91.36 Total Enterprises;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;39.30 Total Enterprises;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;34.20 Total Enterprises;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;56.96 Total Enterprises;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;81.93 Total Enterprises;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;37.30 Total Enterprises;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;31.47 Total Enterprises;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;58.03 Total Enterprises;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;83.83 Total Enterprises;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;29.83 Total Enterprises;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;24.57 Total Enterprises;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;47.50 Total Enterprises;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;76.22 Total Enterprises;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;35.33 Total Enterprises;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;30.25 Total Enterprises;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;52.36 Total Enterprises;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;80.54 Total Enterprises;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;63.52 Total Enterprises;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;60.21 Total Enterprises;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;75.10 Total Enterprises;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;90.75 Total Enterprises;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;77.46 Total Enterprises;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;74.68 Total Enterprises;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;85.21 Total Enterprises;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;92.96 Total Enterprises;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;44.93 Total Enterprises;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;41.04 Total Enterprises;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;53.52 Total Enterprises;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;74.84 Total Enterprises;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;40.01 Total Enterprises;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;37.17 Total Enterprises;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;47.20 Total Enterprises;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;58.46 Total Enterprises;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;31.86 Total Enterprises;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;27.50 Total Enterprises;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;46.58 Total Enterprises;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;77.56 Total Enterprises;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;70.73 Total Enterprises;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;68.41 Total Enterprises;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;74.21 Total Enterprises;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;82.48 Total Enterprises;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;19.13 Total Enterprises;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;20.14 Total Enterprises;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;18.56 Total Enterprises;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;11.43 Total Enterprises;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;10.14 Total Enterprises;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;11.45 Total Enterprises;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;7.24 Total Enterprises;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;6.08 Total Enterprises;H.5 % of enterprises that have experienced an ICT security incident (0);Total;16.19 Total Enterprises;H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;14.13 Total Enterprises;H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;23.55 Total Enterprises;H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;35.99 Total Enterprises;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;74.60 Total Enterprises;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;73.38 Total Enterprises;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;77.22 Total Enterprises;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;79.16 Total Enterprises;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;19.95 Total Enterprises;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;19.30 Total Enterprises;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;21.41 Total Enterprises;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;22.22 Total Enterprises;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;22.08 Total Enterprises;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;22.36 Total Enterprises;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;22.04 Total Enterprises;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;19.29 Total Enterprises;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;16.19 Total Enterprises;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;17.35 Total Enterprises;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;13.17 Total Enterprises;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;13.45 Total Enterprises;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;8.38 Total Enterprises;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;7.63 Total Enterprises;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;9.56 Total Enterprises;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;12.52 Total Enterprises;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;5.33 Total Enterprises;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;4.90 Total Enterprises;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;6.08 Total Enterprises;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;7.56 1. Total Industry (CNAE 10-39);H.1 % of enterprises that apply some ICT security measure (0);Total;91.90 1. Total Industry (CNAE 10-39);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;90.45 1. Total Industry (CNAE 10-39);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;97.27 1. Total Industry (CNAE 10-39);H.1 % of enterprises that apply some ICT security measure (0);250 or more;100.00 1. Total Industry (CNAE 10-39);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;90.23 1. Total Industry (CNAE 10-39);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;88.48 1. Total Industry (CNAE 10-39);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;96.08 1. Total Industry (CNAE 10-39);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;99.87 1. Total Industry (CNAE 10-39);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;21.70 1. Total Industry (CNAE 10-39);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;17.25 1. Total Industry (CNAE 10-39);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;34.99 1. Total Industry (CNAE 10-39);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;52.50 1. Total Industry (CNAE 10-39);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;30.27 1. Total Industry (CNAE 10-39);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;22.67 1. Total Industry (CNAE 10-39);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;52.88 1. Total Industry (CNAE 10-39);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;83.33 1. Total Industry (CNAE 10-39);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;34.93 1. Total Industry (CNAE 10-39);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;28.63 1. Total Industry (CNAE 10-39);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;52.90 1. Total Industry (CNAE 10-39);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;82.32 1. Total Industry (CNAE 10-39);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;92.14 1. Total Industry (CNAE 10-39);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;90.90 1. Total Industry (CNAE 10-39);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;96.48 1. Total Industry (CNAE 10-39);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;98.12 1. Total Industry (CNAE 10-39);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;70.15 1. Total Industry (CNAE 10-39);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;65.27 1. Total Industry (CNAE 10-39);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;86.46 1. Total Industry (CNAE 10-39);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;96.73 1. Total Industry (CNAE 10-39);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;51.03 1. Total Industry (CNAE 10-39);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;42.50 1. Total Industry (CNAE 10-39);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;80.03 1. Total Industry (CNAE 10-39);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;95.50 1. Total Industry (CNAE 10-39);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;35.55 1. Total Industry (CNAE 10-39);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;27.90 1. Total Industry (CNAE 10-39);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;59.20 1. Total Industry (CNAE 10-39);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;85.29 1. Total Industry (CNAE 10-39);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;35.01 1. Total Industry (CNAE 10-39);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;26.84 1. Total Industry (CNAE 10-39);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;60.41 1. Total Industry (CNAE 10-39);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;87.56 1. Total Industry (CNAE 10-39);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;26.45 1. Total Industry (CNAE 10-39);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;19.30 1. Total Industry (CNAE 10-39);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;47.10 1. Total Industry (CNAE 10-39);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;79.28 1. Total Industry (CNAE 10-39);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;33.58 1. Total Industry (CNAE 10-39);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;26.76 1. Total Industry (CNAE 10-39);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;52.92 1. Total Industry (CNAE 10-39);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;85.34 1. Total Industry (CNAE 10-39);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;59.78 1. Total Industry (CNAE 10-39);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;54.42 1. Total Industry (CNAE 10-39);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;76.74 1. Total Industry (CNAE 10-39);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;93.04 1. Total Industry (CNAE 10-39);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;76.96 1. Total Industry (CNAE 10-39);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;73.16 1. Total Industry (CNAE 10-39);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;84.90 1. Total Industry (CNAE 10-39);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;92.84 1. Total Industry (CNAE 10-39);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;40.06 1. Total Industry (CNAE 10-39);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;34.40 1. Total Industry (CNAE 10-39);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;48.23 1. Total Industry (CNAE 10-39);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;76.42 1. Total Industry (CNAE 10-39);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;36.77 1. Total Industry (CNAE 10-39);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;33.56 1. Total Industry (CNAE 10-39);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;42.02 1. Total Industry (CNAE 10-39);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;55.21 1. Total Industry (CNAE 10-39);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;28.34 1. Total Industry (CNAE 10-39);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;22.23 1. Total Industry (CNAE 10-39);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;46.43 1. Total Industry (CNAE 10-39);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;82.02 1. Total Industry (CNAE 10-39);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;68.19 1. Total Industry (CNAE 10-39);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;66.55 1. Total Industry (CNAE 10-39);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;67.13 1. Total Industry (CNAE 10-39);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;80.48 1. Total Industry (CNAE 10-39);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;21.11 1. Total Industry (CNAE 10-39);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;21.05 1. Total Industry (CNAE 10-39);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;24.65 1. Total Industry (CNAE 10-39);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;12.75 1. Total Industry (CNAE 10-39);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;10.69 1. Total Industry (CNAE 10-39);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;12.40 1. Total Industry (CNAE 10-39);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;8.22 1. Total Industry (CNAE 10-39);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;6.77 1. Total Industry (CNAE 10-39);H.5 % of enterprises that have experienced an ICT security incident (0);Total;16.04 1. Total Industry (CNAE 10-39);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;13.27 1. Total Industry (CNAE 10-39);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;24.68 1. Total Industry (CNAE 10-39);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;38.44 1. Total Industry (CNAE 10-39);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;79.56 1. Total Industry (CNAE 10-39);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;78.84 1. Total Industry (CNAE 10-39);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;80.64 1. Total Industry (CNAE 10-39);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;81.97 1. Total Industry (CNAE 10-39);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;14.10 1. Total Industry (CNAE 10-39);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;12.39 1. Total Industry (CNAE 10-39);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;16.68 1. Total Industry (CNAE 10-39);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;19.67 1. Total Industry (CNAE 10-39);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;22.98 1. Total Industry (CNAE 10-39);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;26.67 1. Total Industry (CNAE 10-39);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;14.40 1. Total Industry (CNAE 10-39);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;19.37 1. Total Industry (CNAE 10-39);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;12.32 1. Total Industry (CNAE 10-39);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;13.04 1. Total Industry (CNAE 10-39);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;10.49 1. Total Industry (CNAE 10-39);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;12.10 1. Total Industry (CNAE 10-39);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;7.89 1. Total Industry (CNAE 10-39);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;7.86 1. Total Industry (CNAE 10-39);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;7.09 1. Total Industry (CNAE 10-39);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;10.32 1. Total Industry (CNAE 10-39);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;3.13 1. Total Industry (CNAE 10-39);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;2.95 1. Total Industry (CNAE 10-39);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;3.05 1. Total Industry (CNAE 10-39);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;4.72 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1 % of enterprises that apply some ICT security measure (0);Total;90.21 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;88.93 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;95.51 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1 % of enterprises that apply some ICT security measure (0);250 or more;100.00 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;90.05 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;88.43 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;96.47 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;100.00 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;22.95 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;19.18 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;37.18 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;49.55 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;27.22 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;20.46 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;52.05 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;78.19 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;30.94 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;25.71 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;48.71 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;77.41 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;90.53 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;89.07 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;96.78 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;97.18 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;67.11 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;62.36 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;86.12 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;95.54 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;47.30 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;39.65 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;78.49 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;90.62 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;32.85 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;26.67 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;54.90 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;82.46 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;31.74 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;24.56 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;58.61 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;83.50 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;23.23 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;17.47 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;42.98 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;73.50 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;30.72 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;24.98 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;50.83 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;78.54 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;60.67 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;56.70 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;75.37 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;90.05 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;75.00 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;72.72 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;80.39 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;89.39 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;32.67 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;27.26 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;44.90 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;69.28 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;38.35 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;36.15 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;44.23 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;49.48 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;28.17 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;24.73 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;38.01 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;75.91 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;69.31 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;69.86 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;64.65 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;75.84 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;20.81 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;19.22 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;28.40 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;16.48 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;9.89 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;10.93 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;6.95 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;7.68 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5 % of enterprises that have experienced an ICT security incident (0);Total;19.36 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;16.97 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;27.62 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;45.59 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;84.18 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;84.96 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;82.70 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;80.42 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;10.64 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;8.58 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;16.63 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;14.20 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;30.82 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;34.18 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;20.50 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;26.80 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;6.81 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;4.96 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;12.03 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;10.53 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;5.63 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;4.78 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;8.20 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;6.72 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;3.58 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;3.83 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;2.16 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;5.18 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1 % of enterprises that apply some ICT security measure (0);Total;92.62 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;90.58 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;97.15 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1 % of enterprises that apply some ICT security measure (0);250 or more;100.00 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;90.00 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;87.17 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;95.63 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;100.00 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;22.81 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;15.81 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;34.90 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;53.64 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;36.18 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;24.69 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;54.47 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;91.91 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;39.28 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;28.65 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;57.52 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;86.37 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;94.14 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;92.28 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;98.37 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;98.93 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;76.46 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;69.47 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;90.95 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;99.18 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;56.33 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;42.66 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;85.21 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;99.03 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;42.52 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;30.21 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;66.19 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;88.68 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;41.20 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;27.19 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;68.91 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;91.14 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;30.18 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;17.76 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;52.76 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;81.00 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;36.78 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;23.56 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;62.08 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;86.70 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;59.95 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;50.24 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;78.63 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;96.24 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;82.93 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;77.01 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;89.88 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;95.39 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;45.00 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;35.92 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;48.77 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;82.92 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;38.20 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;35.04 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;37.09 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;57.93 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;30.25 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;19.86 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;48.23 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;85.05 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;72.67 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;68.06 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;74.01 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;82.12 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;18.09 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;19.28 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;19.16 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;12.87 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;9.25 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;12.67 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;6.82 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;5.01 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5 % of enterprises that have experienced an ICT security incident (0);Total;17.53 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;14.74 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;20.95 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;37.08 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;82.79 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;79.17 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;91.33 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;82.40 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;12.36 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;12.72 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;10.75 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;13.82 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;10.64 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;10.87 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;6.61 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;17.43 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;13.13 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;17.52 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;4.84 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;9.61 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;10.62 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;11.80 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;6.17 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;14.01 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;0.85 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;0.00 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;1.93 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;2.55 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1 % of enterprises that apply some ICT security measure (0);Total;90.08 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;88.42 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;98.71 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1 % of enterprises that apply some ICT security measure (0);250 or more;100.00 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;89.02 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;87.30 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;96.78 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;100.00 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;16.08 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;13.53 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;26.10 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;42.14 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;29.32 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;23.98 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;50.22 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;84.36 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;33.25 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;28.76 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;51.53 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;74.92 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;93.41 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;93.12 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;94.42 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;97.17 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;70.66 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;67.95 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;81.50 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;97.17 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;45.58 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;38.90 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;74.14 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;98.30 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;30.36 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;24.69 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;53.41 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;83.41 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;29.71 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;23.97 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;52.59 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;86.40 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;21.72 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;15.85 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;45.26 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;78.56 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;29.00 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;24.16 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;45.75 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;93.59 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;55.55 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;50.95 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;74.62 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;95.89 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;68.98 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;64.66 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;81.28 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;88.60 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;44.58 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;41.93 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;48.85 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;73.68 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;29.59 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;27.71 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;31.96 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;53.48 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;23.92 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;19.16 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;44.36 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;81.74 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;63.80 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;59.01 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;70.42 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;85.73 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;18.44 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;19.38 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;19.82 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;4.48 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;17.75 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;21.61 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;9.76 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;9.79 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5 % of enterprises that have experienced an ICT security incident (0);Total;10.42 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;8.13 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;20.33 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;37.61 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;69.09 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;67.15 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;70.28 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;81.90 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;12.71 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;11.99 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;13.69 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;15.50 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;19.58 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;19.62 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;19.88 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;18.10 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;16.73 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;18.39 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;13.54 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;13.59 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;8.98 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;9.08 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;10.32 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;3.22 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;6.75 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;6.41 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;8.83 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;2.25 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1 % of enterprises that apply some ICT security measure (0);Total;94.59 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;93.59 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;98.21 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1 % of enterprises that apply some ICT security measure (0);250 or more;100.00 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;90.43 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;88.96 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;95.19 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;99.47 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;22.50 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;17.42 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;37.92 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;58.04 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;29.50 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;21.55 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;54.25 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;82.21 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;36.00 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;29.50 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;54.24 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;87.47 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;92.37 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;91.31 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;95.67 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;99.44 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;68.77 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;63.62 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;86.49 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;95.90 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;55.92 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;47.81 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;84.21 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;96.87 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;37.15 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;29.22 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;62.86 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;85.57 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;38.23 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;30.53 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;62.43 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;88.30 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;30.40 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;23.73 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;48.84 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;84.47 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;36.74 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;30.60 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;53.09 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;89.21 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;59.76 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;54.33 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;77.39 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;92.86 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;80.41 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;76.85 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;87.83 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;95.50 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;42.17 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;36.30 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;50.77 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;79.86 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;37.05 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;31.78 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;49.07 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;55.75 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;28.45 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;20.21 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;55.43 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;86.55 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;65.03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;62.83 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;62.25 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;83.55 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;26.84 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;27.58 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;31.24 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;11.09 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;8.13 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;9.59 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;6.52 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;5.36 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5 % of enterprises that have experienced an ICT security incident (0);Total;13.86 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;10.81 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;24.66 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;32.03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;77.03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;73.87 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;80.80 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;87.03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;19.81 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;20.70 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;14.98 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;29.54 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;18.37 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;24.75 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;6.55 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;11.97 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;20.13 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;24.58 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;12.23 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;14.60 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;9.53 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;11.18 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;5.96 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;9.63 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;2.10 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;1.46 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;3.14 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;3.17 1.5. Energy and water (CNAE 35-39);H.1 % of enterprises that apply some ICT security measure (0);Total;95.91 1.5. Energy and water (CNAE 35-39);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;94.47 1.5. Energy and water (CNAE 35-39);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;100.00 1.5. Energy and water (CNAE 35-39);H.1 % of enterprises that apply some ICT security measure (0);250 or more;100.00 1.5. Energy and water (CNAE 35-39);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;95.15 1.5. Energy and water (CNAE 35-39);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;94.13 1.5. Energy and water (CNAE 35-39);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;97.11 1.5. Energy and water (CNAE 35-39);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;100.00 1.5. Energy and water (CNAE 35-39);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;24.72 1.5. Energy and water (CNAE 35-39);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;19.11 1.5. Energy and water (CNAE 35-39);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;34.11 1.5. Energy and water (CNAE 35-39);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;55.16 1.5. Energy and water (CNAE 35-39);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;42.11 1.5. Energy and water (CNAE 35-39);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;35.21 1.5. Energy and water (CNAE 35-39);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;53.69 1.5. Energy and water (CNAE 35-39);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;79.49 1.5. Energy and water (CNAE 35-39);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;51.21 1.5. Energy and water (CNAE 35-39);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;45.96 1.5. Energy and water (CNAE 35-39);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;59.22 1.5. Energy and water (CNAE 35-39);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;81.74 1.5. Energy and water (CNAE 35-39);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;92.76 1.5. Energy and water (CNAE 35-39);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;91.10 1.5. Energy and water (CNAE 35-39);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;97.48 1.5. Energy and water (CNAE 35-39);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;96.62 1.5. Energy and water (CNAE 35-39);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;78.96 1.5. Energy and water (CNAE 35-39);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;75.16 1.5. Energy and water (CNAE 35-39);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;86.72 1.5. Energy and water (CNAE 35-39);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;95.89 1.5. Energy and water (CNAE 35-39);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;57.75 1.5. Energy and water (CNAE 35-39);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;50.49 1.5. Energy and water (CNAE 35-39);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;70.58 1.5. Energy and water (CNAE 35-39);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;95.35 1.5. Energy and water (CNAE 35-39);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;45.06 1.5. Energy and water (CNAE 35-39);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;36.62 1.5. Energy and water (CNAE 35-39);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;60.76 1.5. Energy and water (CNAE 35-39);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;86.75 1.5. Energy and water (CNAE 35-39);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;43.45 1.5. Energy and water (CNAE 35-39);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;35.45 1.5. Energy and water (CNAE 35-39);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;55.59 1.5. Energy and water (CNAE 35-39);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;90.37 1.5. Energy and water (CNAE 35-39);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;35.83 1.5. Energy and water (CNAE 35-39);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;27.65 1.5. Energy and water (CNAE 35-39);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;49.50 1.5. Energy and water (CNAE 35-39);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;80.27 1.5. Energy and water (CNAE 35-39);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;45.02 1.5. Energy and water (CNAE 35-39);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;38.80 1.5. Energy and water (CNAE 35-39);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;53.26 1.5. Energy and water (CNAE 35-39);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;84.62 1.5. Energy and water (CNAE 35-39);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;67.10 1.5. Energy and water (CNAE 35-39);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;60.86 1.5. Energy and water (CNAE 35-39);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;80.92 1.5. Energy and water (CNAE 35-39);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;91.84 1.5. Energy and water (CNAE 35-39);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;82.42 1.5. Energy and water (CNAE 35-39);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;78.00 1.5. Energy and water (CNAE 35-39);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;89.75 1.5. Energy and water (CNAE 35-39);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;94.14 1.5. Energy and water (CNAE 35-39);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;53.18 1.5. Energy and water (CNAE 35-39);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;50.21 1.5. Energy and water (CNAE 35-39);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;52.21 1.5. Energy and water (CNAE 35-39);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;75.02 1.5. Energy and water (CNAE 35-39);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;41.76 1.5. Energy and water (CNAE 35-39);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;37.96 1.5. Energy and water (CNAE 35-39);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;42.23 1.5. Energy and water (CNAE 35-39);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;65.65 1.5. Energy and water (CNAE 35-39);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;39.11 1.5. Energy and water (CNAE 35-39);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;30.50 1.5. Energy and water (CNAE 35-39);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;56.84 1.5. Energy and water (CNAE 35-39);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;81.94 1.5. Energy and water (CNAE 35-39);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;72.96 1.5. Energy and water (CNAE 35-39);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;73.34 1.5. Energy and water (CNAE 35-39);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;70.58 1.5. Energy and water (CNAE 35-39);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;75.91 1.5. Energy and water (CNAE 35-39);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;15.32 1.5. Energy and water (CNAE 35-39);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;18.41 1.5. Energy and water (CNAE 35-39);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;9.17 1.5. Energy and water (CNAE 35-39);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;14.71 1.5. Energy and water (CNAE 35-39);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;11.73 1.5. Energy and water (CNAE 35-39);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;8.25 1.5. Energy and water (CNAE 35-39);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;20.25 1.5. Energy and water (CNAE 35-39);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;9.38 1.5. Energy and water (CNAE 35-39);H.5 % of enterprises that have experienced an ICT security incident (0);Total;17.42 1.5. Energy and water (CNAE 35-39);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;12.06 1.5. Energy and water (CNAE 35-39);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;31.07 1.5. Energy and water (CNAE 35-39);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;37.01 1.5. Energy and water (CNAE 35-39);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;64.67 1.5. Energy and water (CNAE 35-39);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;61.63 1.5. Energy and water (CNAE 35-39);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;64.35 1.5. Energy and water (CNAE 35-39);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;75.82 1.5. Energy and water (CNAE 35-39);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;28.34 1.5. Energy and water (CNAE 35-39);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;18.19 1.5. Energy and water (CNAE 35-39);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;39.72 1.5. Energy and water (CNAE 35-39);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;37.38 1.5. Energy and water (CNAE 35-39);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;17.68 1.5. Energy and water (CNAE 35-39);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;19.49 1.5. Energy and water (CNAE 35-39);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;16.61 1.5. Energy and water (CNAE 35-39);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;13.84 1.5. Energy and water (CNAE 35-39);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;16.39 1.5. Energy and water (CNAE 35-39);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;24.15 1.5. Energy and water (CNAE 35-39);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;4.33 1.5. Energy and water (CNAE 35-39);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;17.13 1.5. Energy and water (CNAE 35-39);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;10.27 1.5. Energy and water (CNAE 35-39);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;11.99 1.5. Energy and water (CNAE 35-39);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;1.88 1.5. Energy and water (CNAE 35-39);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;23.42 1.5. Energy and water (CNAE 35-39);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;2.12 1.5. Energy and water (CNAE 35-39);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;0.00 1.5. Energy and water (CNAE 35-39);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;0.00 1.5. Energy and water (CNAE 35-39);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;14.19 2. Total Construction (CNAE 41-43);H.1 % of enterprises that apply some ICT security measure (0);Total;87.38 2. Total Construction (CNAE 41-43);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;86.86 2. Total Construction (CNAE 41-43);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;91.02 2. Total Construction (CNAE 41-43);H.1 % of enterprises that apply some ICT security measure (0);250 or more;99.01 2. Total Construction (CNAE 41-43);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;89.11 2. Total Construction (CNAE 41-43);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;88.57 2. Total Construction (CNAE 41-43);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;92.78 2. Total Construction (CNAE 41-43);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;99.38 2. Total Construction (CNAE 41-43);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;20.30 2. Total Construction (CNAE 41-43);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;19.64 2. Total Construction (CNAE 41-43);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;23.35 2. Total Construction (CNAE 41-43);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;48.92 2. Total Construction (CNAE 41-43);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;24.89 2. Total Construction (CNAE 41-43);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;23.00 2. Total Construction (CNAE 41-43);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;36.44 2. Total Construction (CNAE 41-43);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;73.55 2. Total Construction (CNAE 41-43);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;30.72 2. Total Construction (CNAE 41-43);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;29.55 2. Total Construction (CNAE 41-43);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;36.96 2. Total Construction (CNAE 41-43);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;71.01 2. Total Construction (CNAE 41-43);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;87.00 2. Total Construction (CNAE 41-43);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;86.50 2. Total Construction (CNAE 41-43);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;90.28 2. Total Construction (CNAE 41-43);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;97.33 2. Total Construction (CNAE 41-43);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;54.10 2. Total Construction (CNAE 41-43);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;52.07 2. Total Construction (CNAE 41-43);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;67.95 2. Total Construction (CNAE 41-43);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;91.58 2. Total Construction (CNAE 41-43);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;34.88 2. Total Construction (CNAE 41-43);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;31.30 2. Total Construction (CNAE 41-43);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;60.34 2. Total Construction (CNAE 41-43);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;88.72 2. Total Construction (CNAE 41-43);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;25.04 2. Total Construction (CNAE 41-43);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;23.46 2. Total Construction (CNAE 41-43);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;33.83 2. Total Construction (CNAE 41-43);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;76.33 2. Total Construction (CNAE 41-43);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;19.36 2. Total Construction (CNAE 41-43);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;17.05 2. Total Construction (CNAE 41-43);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;33.96 2. Total Construction (CNAE 41-43);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;74.39 2. Total Construction (CNAE 41-43);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;13.06 2. Total Construction (CNAE 41-43);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;11.07 2. Total Construction (CNAE 41-43);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;25.12 2. Total Construction (CNAE 41-43);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;67.01 2. Total Construction (CNAE 41-43);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;20.67 2. Total Construction (CNAE 41-43);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;18.97 2. Total Construction (CNAE 41-43);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;30.55 2. Total Construction (CNAE 41-43);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;71.40 2. Total Construction (CNAE 41-43);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;52.03 2. Total Construction (CNAE 41-43);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;51.06 2. Total Construction (CNAE 41-43);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;57.07 2. Total Construction (CNAE 41-43);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;87.20 2. Total Construction (CNAE 41-43);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;65.11 2. Total Construction (CNAE 41-43);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;61.80 2. Total Construction (CNAE 41-43);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;86.62 2. Total Construction (CNAE 41-43);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;90.90 2. Total Construction (CNAE 41-43);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;40.78 2. Total Construction (CNAE 41-43);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;40.19 2. Total Construction (CNAE 41-43);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;41.89 2. Total Construction (CNAE 41-43);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;65.86 2. Total Construction (CNAE 41-43);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;38.17 2. Total Construction (CNAE 41-43);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;38.33 2. Total Construction (CNAE 41-43);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;34.39 2. Total Construction (CNAE 41-43);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;57.14 2. Total Construction (CNAE 41-43);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;20.07 2. Total Construction (CNAE 41-43);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;19.13 2. Total Construction (CNAE 41-43);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;24.59 2. Total Construction (CNAE 41-43);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;66.55 2. Total Construction (CNAE 41-43);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;64.97 2. Total Construction (CNAE 41-43);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;63.55 2. Total Construction (CNAE 41-43);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;71.17 2. Total Construction (CNAE 41-43);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;81.13 2. Total Construction (CNAE 41-43);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;26.55 2. Total Construction (CNAE 41-43);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;27.42 2. Total Construction (CNAE 41-43);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;23.36 2. Total Construction (CNAE 41-43);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;13.72 2. Total Construction (CNAE 41-43);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;8.48 2. Total Construction (CNAE 41-43);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;9.03 2. Total Construction (CNAE 41-43);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;5.46 2. Total Construction (CNAE 41-43);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;5.15 2. Total Construction (CNAE 41-43);H.5 % of enterprises that have experienced an ICT security incident (0);Total;12.85 2. Total Construction (CNAE 41-43);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;12.43 2. Total Construction (CNAE 41-43);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;13.98 2. Total Construction (CNAE 41-43);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;44.42 2. Total Construction (CNAE 41-43);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;74.03 2. Total Construction (CNAE 41-43);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;74.44 2. Total Construction (CNAE 41-43);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;71.12 2. Total Construction (CNAE 41-43);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;72.99 2. Total Construction (CNAE 41-43);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;14.74 2. Total Construction (CNAE 41-43);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;14.96 2. Total Construction (CNAE 41-43);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;11.66 2. Total Construction (CNAE 41-43);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;19.92 2. Total Construction (CNAE 41-43);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;22.34 2. Total Construction (CNAE 41-43);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;21.17 2. Total Construction (CNAE 41-43);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;33.46 2. Total Construction (CNAE 41-43);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;15.15 2. Total Construction (CNAE 41-43);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;21.77 2. Total Construction (CNAE 41-43);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;22.69 2. Total Construction (CNAE 41-43);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;16.54 2. Total Construction (CNAE 41-43);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;14.06 2. Total Construction (CNAE 41-43);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;7.86 2. Total Construction (CNAE 41-43);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;6.42 2. Total Construction (CNAE 41-43);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;16.82 2. Total Construction (CNAE 41-43);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;16.85 2. Total Construction (CNAE 41-43);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;6.35 2. Total Construction (CNAE 41-43);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;5.92 2. Total Construction (CNAE 41-43);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;10.10 2. Total Construction (CNAE 41-43);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;4.85 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1 % of enterprises that apply some ICT security measure (0);Total;92.08 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;91.24 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;95.05 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1 % of enterprises that apply some ICT security measure (0);250 or more;98.45 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;91.99 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;90.92 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;95.97 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;98.20 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;22.96 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;19.65 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;33.64 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;49.17 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;39.01 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;34.11 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;54.81 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;77.66 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;45.42 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;41.04 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;59.84 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;78.69 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;92.04 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;91.23 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;94.84 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;97.71 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;73.43 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;70.24 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;84.59 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;95.03 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;57.46 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;52.69 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;74.21 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;89.59 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;44.73 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;40.07 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;59.98 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;80.72 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;43.06 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;37.68 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;61.15 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;82.68 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;35.76 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;30.80 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;51.67 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;75.38 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;39.98 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;35.04 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;55.96 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;78.88 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;68.22 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;65.39 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;77.51 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;89.91 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;80.15 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;78.14 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;85.17 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;93.15 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;47.67 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;43.64 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;57.59 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;74.63 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;41.65 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;38.22 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;51.38 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;60.12 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;36.71 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;32.36 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;50.73 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;76.21 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;72.48 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;69.85 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;77.56 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;83.55 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;17.32 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;18.55 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;15.47 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;10.65 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;10.20 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;11.60 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;6.97 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;5.80 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5 % of enterprises that have experienced an ICT security incident (0);Total;17.19 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;15.02 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;24.78 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;34.33 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;72.65 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;70.99 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;76.23 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;78.22 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;23.47 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;23.08 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;24.67 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;23.73 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;21.65 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;20.99 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;24.46 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;19.59 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;16.64 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;17.68 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;14.09 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;14.10 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;8.70 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;7.85 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;9.97 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;13.29 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;6.04 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;5.39 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;7.09 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;9.26 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1 % of enterprises that apply some ICT security measure (0);Total;92.63 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;91.97 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;95.86 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1 % of enterprises that apply some ICT security measure (0);250 or more;97.59 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;90.94 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;89.89 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;95.87 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;98.17 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;21.98 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;19.37 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;31.61 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;53.86 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;31.40 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;27.00 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;49.46 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;75.52 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;37.54 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;33.52 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;54.26 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;76.97 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;91.23 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;90.74 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;92.89 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;97.76 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;72.10 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;69.44 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;83.55 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;95.85 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;54.88 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;50.32 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;75.36 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;91.60 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;38.34 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;33.77 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;57.85 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;80.22 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;36.48 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;31.27 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;59.09 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;82.55 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;30.41 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;26.40 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;46.51 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;72.61 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;34.86 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;31.00 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;50.13 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;76.88 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;66.26 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;64.17 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;74.18 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;90.60 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;77.24 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;75.12 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;84.45 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;93.69 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;45.04 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;42.38 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;52.75 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;71.06 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;36.20 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;33.31 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;46.48 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;56.48 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;31.21 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;28.18 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;42.72 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;71.10 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;68.58 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;66.71 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;72.12 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;81.96 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;18.95 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;19.66 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;17.97 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;12.83 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;12.47 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;13.63 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;9.92 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;5.21 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5 % of enterprises that have experienced an ICT security incident (0);Total;14.87 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;12.71 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;24.33 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;36.90 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;76.86 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;74.90 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;81.75 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;82.34 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;20.55 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;20.24 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;20.72 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;23.37 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;17.43 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;15.33 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;23.81 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;19.35 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;14.16 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;13.69 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;14.40 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;18.66 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;5.61 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;4.66 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;7.72 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;9.11 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;3.91 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;3.19 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;5.35 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;7.14 3.2. Transport and storage (CNAE 49-53);H.1 % of enterprises that apply some ICT security measure (0);Total;91.58 3.2. Transport and storage (CNAE 49-53);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;90.82 3.2. Transport and storage (CNAE 49-53);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;94.61 3.2. Transport and storage (CNAE 49-53);H.1 % of enterprises that apply some ICT security measure (0);250 or more;98.69 3.2. Transport and storage (CNAE 49-53);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;88.78 3.2. Transport and storage (CNAE 49-53);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;87.43 3.2. Transport and storage (CNAE 49-53);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;94.25 3.2. Transport and storage (CNAE 49-53);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;98.91 3.2. Transport and storage (CNAE 49-53);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;18.87 3.2. Transport and storage (CNAE 49-53);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;16.00 3.2. Transport and storage (CNAE 49-53);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;28.09 3.2. Transport and storage (CNAE 49-53);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;50.01 3.2. Transport and storage (CNAE 49-53);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;32.54 3.2. Transport and storage (CNAE 49-53);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;28.82 3.2. Transport and storage (CNAE 49-53);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;43.16 3.2. Transport and storage (CNAE 49-53);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;78.38 3.2. Transport and storage (CNAE 49-53);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;37.69 3.2. Transport and storage (CNAE 49-53);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;34.99 3.2. Transport and storage (CNAE 49-53);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;44.01 3.2. Transport and storage (CNAE 49-53);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;76.35 3.2. Transport and storage (CNAE 49-53);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;89.50 3.2. Transport and storage (CNAE 49-53);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;88.26 3.2. Transport and storage (CNAE 49-53);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;94.77 3.2. Transport and storage (CNAE 49-53);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;98.13 3.2. Transport and storage (CNAE 49-53);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;64.85 3.2. Transport and storage (CNAE 49-53);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;61.55 3.2. Transport and storage (CNAE 49-53);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;76.53 3.2. Transport and storage (CNAE 49-53);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;96.62 3.2. Transport and storage (CNAE 49-53);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;45.53 3.2. Transport and storage (CNAE 49-53);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;40.47 3.2. Transport and storage (CNAE 49-53);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;63.52 3.2. Transport and storage (CNAE 49-53);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;93.86 3.2. Transport and storage (CNAE 49-53);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;35.20 3.2. Transport and storage (CNAE 49-53);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;31.25 3.2. Transport and storage (CNAE 49-53);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;47.42 3.2. Transport and storage (CNAE 49-53);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;80.10 3.2. Transport and storage (CNAE 49-53);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;29.98 3.2. Transport and storage (CNAE 49-53);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;25.24 3.2. Transport and storage (CNAE 49-53);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;45.16 3.2. Transport and storage (CNAE 49-53);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;81.77 3.2. Transport and storage (CNAE 49-53);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;23.51 3.2. Transport and storage (CNAE 49-53);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;19.09 3.2. Transport and storage (CNAE 49-53);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;36.59 3.2. Transport and storage (CNAE 49-53);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;76.32 3.2. Transport and storage (CNAE 49-53);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;30.34 3.2. Transport and storage (CNAE 49-53);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;26.51 3.2. Transport and storage (CNAE 49-53);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;40.56 3.2. Transport and storage (CNAE 49-53);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;80.35 3.2. Transport and storage (CNAE 49-53);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;55.62 3.2. Transport and storage (CNAE 49-53);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;51.85 3.2. Transport and storage (CNAE 49-53);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;69.27 3.2. Transport and storage (CNAE 49-53);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;90.51 3.2. Transport and storage (CNAE 49-53);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;72.84 3.2. Transport and storage (CNAE 49-53);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;70.37 3.2. Transport and storage (CNAE 49-53);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;77.01 3.2. Transport and storage (CNAE 49-53);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;93.67 3.2. Transport and storage (CNAE 49-53);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;45.66 3.2. Transport and storage (CNAE 49-53);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;42.50 3.2. Transport and storage (CNAE 49-53);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;50.03 3.2. Transport and storage (CNAE 49-53);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;75.18 3.2. Transport and storage (CNAE 49-53);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;38.23 3.2. Transport and storage (CNAE 49-53);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;35.29 3.2. Transport and storage (CNAE 49-53);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;44.05 3.2. Transport and storage (CNAE 49-53);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;60.35 3.2. Transport and storage (CNAE 49-53);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;25.83 3.2. Transport and storage (CNAE 49-53);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;22.60 3.2. Transport and storage (CNAE 49-53);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;33.86 3.2. Transport and storage (CNAE 49-53);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;75.83 3.2. Transport and storage (CNAE 49-53);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;65.49 3.2. Transport and storage (CNAE 49-53);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;62.10 3.2. Transport and storage (CNAE 49-53);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;72.74 3.2. Transport and storage (CNAE 49-53);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;78.05 3.2. Transport and storage (CNAE 49-53);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;24.66 3.2. Transport and storage (CNAE 49-53);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;27.56 3.2. Transport and storage (CNAE 49-53);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;17.85 3.2. Transport and storage (CNAE 49-53);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;15.01 3.2. Transport and storage (CNAE 49-53);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;9.85 3.2. Transport and storage (CNAE 49-53);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;10.34 3.2. Transport and storage (CNAE 49-53);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;9.40 3.2. Transport and storage (CNAE 49-53);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;6.94 3.2. Transport and storage (CNAE 49-53);H.5 % of enterprises that have experienced an ICT security incident (0);Total;13.13 3.2. Transport and storage (CNAE 49-53);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;11.12 3.2. Transport and storage (CNAE 49-53);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;20.52 3.2. Transport and storage (CNAE 49-53);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;34.20 3.2. Transport and storage (CNAE 49-53);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;74.18 3.2. Transport and storage (CNAE 49-53);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;73.95 3.2. Transport and storage (CNAE 49-53);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;73.03 3.2. Transport and storage (CNAE 49-53);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;78.90 3.2. Transport and storage (CNAE 49-53);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;19.41 3.2. Transport and storage (CNAE 49-53);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;18.05 3.2. Transport and storage (CNAE 49-53);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;21.63 3.2. Transport and storage (CNAE 49-53);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;25.21 3.2. Transport and storage (CNAE 49-53);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;17.18 3.2. Transport and storage (CNAE 49-53);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;15.16 3.2. Transport and storage (CNAE 49-53);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;22.12 3.2. Transport and storage (CNAE 49-53);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;21.78 3.2. Transport and storage (CNAE 49-53);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;23.27 3.2. Transport and storage (CNAE 49-53);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;28.84 3.2. Transport and storage (CNAE 49-53);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;9.44 3.2. Transport and storage (CNAE 49-53);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;11.09 3.2. Transport and storage (CNAE 49-53);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;10.56 3.2. Transport and storage (CNAE 49-53);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;9.94 3.2. Transport and storage (CNAE 49-53);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;11.55 3.2. Transport and storage (CNAE 49-53);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;13.24 3.2. Transport and storage (CNAE 49-53);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;4.66 3.2. Transport and storage (CNAE 49-53);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;4.60 3.2. Transport and storage (CNAE 49-53);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;4.50 3.2. Transport and storage (CNAE 49-53);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;5.56 3.3. Accommodation services (CNAE 55);H.1 % of enterprises that apply some ICT security measure (0);Total;94.98 3.3. Accommodation services (CNAE 55);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;94.84 3.3. Accommodation services (CNAE 55);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;94.45 3.3. Accommodation services (CNAE 55);H.1 % of enterprises that apply some ICT security measure (0);250 or more;100.00 3.3. Accommodation services (CNAE 55);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;94.90 3.3. Accommodation services (CNAE 55);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;93.98 3.3. Accommodation services (CNAE 55);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;96.87 3.3. Accommodation services (CNAE 55);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;99.35 3.3. Accommodation services (CNAE 55);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;25.40 3.3. Accommodation services (CNAE 55);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;18.21 3.3. Accommodation services (CNAE 55);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;42.28 3.3. Accommodation services (CNAE 55);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;53.61 3.3. Accommodation services (CNAE 55);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;33.99 3.3. Accommodation services (CNAE 55);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;24.84 3.3. Accommodation services (CNAE 55);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;53.23 3.3. Accommodation services (CNAE 55);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;80.91 3.3. Accommodation services (CNAE 55);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;39.12 3.3. Accommodation services (CNAE 55);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;30.43 3.3. Accommodation services (CNAE 55);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;57.63 3.3. Accommodation services (CNAE 55);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;82.48 3.3. Accommodation services (CNAE 55);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;92.63 3.3. Accommodation services (CNAE 55);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;91.27 3.3. Accommodation services (CNAE 55);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;95.84 3.3. Accommodation services (CNAE 55);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;97.77 3.3. Accommodation services (CNAE 55);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;70.07 3.3. Accommodation services (CNAE 55);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;62.86 3.3. Accommodation services (CNAE 55);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;86.98 3.3. Accommodation services (CNAE 55);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;98.47 3.3. Accommodation services (CNAE 55);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;52.10 3.3. Accommodation services (CNAE 55);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;42.88 3.3. Accommodation services (CNAE 55);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;72.35 3.3. Accommodation services (CNAE 55);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;95.00 3.3. Accommodation services (CNAE 55);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;40.16 3.3. Accommodation services (CNAE 55);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;30.91 3.3. Accommodation services (CNAE 55);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;60.24 3.3. Accommodation services (CNAE 55);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;84.32 3.3. Accommodation services (CNAE 55);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;35.80 3.3. Accommodation services (CNAE 55);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;25.40 3.3. Accommodation services (CNAE 55);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;56.93 3.3. Accommodation services (CNAE 55);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;92.74 3.3. Accommodation services (CNAE 55);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;32.86 3.3. Accommodation services (CNAE 55);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;25.28 3.3. Accommodation services (CNAE 55);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;47.85 3.3. Accommodation services (CNAE 55);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;76.33 3.3. Accommodation services (CNAE 55);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;40.34 3.3. Accommodation services (CNAE 55);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;33.64 3.3. Accommodation services (CNAE 55);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;53.01 3.3. Accommodation services (CNAE 55);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;81.69 3.3. Accommodation services (CNAE 55);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;69.92 3.3. Accommodation services (CNAE 55);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;66.65 3.3. Accommodation services (CNAE 55);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;75.20 3.3. Accommodation services (CNAE 55);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;94.60 3.3. Accommodation services (CNAE 55);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;76.23 3.3. Accommodation services (CNAE 55);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;74.65 3.3. Accommodation services (CNAE 55);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;76.88 3.3. Accommodation services (CNAE 55);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;91.00 3.3. Accommodation services (CNAE 55);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;49.89 3.3. Accommodation services (CNAE 55);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;46.74 3.3. Accommodation services (CNAE 55);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;53.86 3.3. Accommodation services (CNAE 55);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;68.74 3.3. Accommodation services (CNAE 55);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;40.65 3.3. Accommodation services (CNAE 55);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;31.55 3.3. Accommodation services (CNAE 55);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;57.73 3.3. Accommodation services (CNAE 55);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;73.14 3.3. Accommodation services (CNAE 55);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;40.89 3.3. Accommodation services (CNAE 55);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;34.02 3.3. Accommodation services (CNAE 55);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;55.33 3.3. Accommodation services (CNAE 55);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;77.79 3.3. Accommodation services (CNAE 55);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;72.50 3.3. Accommodation services (CNAE 55);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;66.45 3.3. Accommodation services (CNAE 55);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;81.36 3.3. Accommodation services (CNAE 55);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;82.81 3.3. Accommodation services (CNAE 55);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;20.32 3.3. Accommodation services (CNAE 55);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;27.12 3.3. Accommodation services (CNAE 55);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;8.78 3.3. Accommodation services (CNAE 55);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;14.50 3.3. Accommodation services (CNAE 55);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;7.18 3.3. Accommodation services (CNAE 55);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;6.42 3.3. Accommodation services (CNAE 55);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;9.86 3.3. Accommodation services (CNAE 55);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;2.69 3.3. Accommodation services (CNAE 55);H.5 % of enterprises that have experienced an ICT security incident (0);Total;22.86 3.3. Accommodation services (CNAE 55);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;19.74 3.3. Accommodation services (CNAE 55);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;29.16 3.3. Accommodation services (CNAE 55);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;41.10 3.3. Accommodation services (CNAE 55);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;68.98 3.3. Accommodation services (CNAE 55);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;58.99 3.3. Accommodation services (CNAE 55);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;85.68 3.3. Accommodation services (CNAE 55);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;85.51 3.3. Accommodation services (CNAE 55);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;30.78 3.3. Accommodation services (CNAE 55);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;30.47 3.3. Accommodation services (CNAE 55);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;32.43 3.3. Accommodation services (CNAE 55);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;27.17 3.3. Accommodation services (CNAE 55);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;24.47 3.3. Accommodation services (CNAE 55);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;23.66 3.3. Accommodation services (CNAE 55);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;25.58 3.3. Accommodation services (CNAE 55);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;26.78 3.3. Accommodation services (CNAE 55);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;20.78 3.3. Accommodation services (CNAE 55);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;23.78 3.3. Accommodation services (CNAE 55);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;14.37 3.3. Accommodation services (CNAE 55);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;21.00 3.3. Accommodation services (CNAE 55);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;9.56 3.3. Accommodation services (CNAE 55);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;6.53 3.3. Accommodation services (CNAE 55);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;15.25 3.3. Accommodation services (CNAE 55);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;12.27 3.3. Accommodation services (CNAE 55);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;7.59 3.3. Accommodation services (CNAE 55);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;6.65 3.3. Accommodation services (CNAE 55);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;7.92 3.3. Accommodation services (CNAE 55);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;13.71 3.4. Information and communications (CNAE 58-63);H.1 % of enterprises that apply some ICT security measure (0);Total;97.29 3.4. Information and communications (CNAE 58-63);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;96.65 3.4. Information and communications (CNAE 58-63);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;98.99 3.4. Information and communications (CNAE 58-63);H.1 % of enterprises that apply some ICT security measure (0);250 or more;100.00 3.4. Information and communications (CNAE 58-63);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;95.72 3.4. Information and communications (CNAE 58-63);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;94.33 3.4. Information and communications (CNAE 58-63);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;99.81 3.4. Information and communications (CNAE 58-63);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;99.67 3.4. Information and communications (CNAE 58-63);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;33.83 3.4. Information and communications (CNAE 58-63);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;28.17 3.4. Information and communications (CNAE 58-63);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;47.48 3.4. Information and communications (CNAE 58-63);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;62.09 3.4. Information and communications (CNAE 58-63);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;72.69 3.4. Information and communications (CNAE 58-63);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;68.17 3.4. Information and communications (CNAE 58-63);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;84.55 3.4. Information and communications (CNAE 58-63);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;91.34 3.4. Information and communications (CNAE 58-63);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;76.10 3.4. Information and communications (CNAE 58-63);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;72.31 3.4. Information and communications (CNAE 58-63);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;85.60 3.4. Information and communications (CNAE 58-63);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;93.52 3.4. Information and communications (CNAE 58-63);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;97.04 3.4. Information and communications (CNAE 58-63);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;96.72 3.4. Information and communications (CNAE 58-63);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;97.69 3.4. Information and communications (CNAE 58-63);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;99.13 3.4. Information and communications (CNAE 58-63);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;88.88 3.4. Information and communications (CNAE 58-63);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;86.57 3.4. Information and communications (CNAE 58-63);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;94.59 3.4. Information and communications (CNAE 58-63);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;99.67 3.4. Information and communications (CNAE 58-63);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;83.07 3.4. Information and communications (CNAE 58-63);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;80.14 3.4. Information and communications (CNAE 58-63);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;90.45 3.4. Information and communications (CNAE 58-63);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;96.42 3.4. Information and communications (CNAE 58-63);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;72.84 3.4. Information and communications (CNAE 58-63);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;68.57 3.4. Information and communications (CNAE 58-63);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;84.01 3.4. Information and communications (CNAE 58-63);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;90.51 3.4. Information and communications (CNAE 58-63);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;76.86 3.4. Information and communications (CNAE 58-63);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;72.74 3.4. Information and communications (CNAE 58-63);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;87.19 3.4. Information and communications (CNAE 58-63);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;95.72 3.4. Information and communications (CNAE 58-63);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;68.48 3.4. Information and communications (CNAE 58-63);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;62.50 3.4. Information and communications (CNAE 58-63);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;84.19 3.4. Information and communications (CNAE 58-63);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;92.94 3.4. Information and communications (CNAE 58-63);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;69.96 3.4. Information and communications (CNAE 58-63);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;65.23 3.4. Information and communications (CNAE 58-63);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;81.90 3.4. Information and communications (CNAE 58-63);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;91.27 3.4. Information and communications (CNAE 58-63);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;89.07 3.4. Information and communications (CNAE 58-63);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;87.06 3.4. Information and communications (CNAE 58-63);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;94.58 3.4. Information and communications (CNAE 58-63);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;96.25 3.4. Information and communications (CNAE 58-63);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;91.69 3.4. Information and communications (CNAE 58-63);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;89.92 3.4. Information and communications (CNAE 58-63);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;96.17 3.4. Information and communications (CNAE 58-63);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;97.41 3.4. Information and communications (CNAE 58-63);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;59.16 3.4. Information and communications (CNAE 58-63);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;52.66 3.4. Information and communications (CNAE 58-63);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;73.85 3.4. Information and communications (CNAE 58-63);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;87.45 3.4. Information and communications (CNAE 58-63);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;53.45 3.4. Information and communications (CNAE 58-63);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;50.04 3.4. Information and communications (CNAE 58-63);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;60.12 3.4. Information and communications (CNAE 58-63);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;72.36 3.4. Information and communications (CNAE 58-63);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;68.10 3.4. Information and communications (CNAE 58-63);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;62.99 3.4. Information and communications (CNAE 58-63);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;80.94 3.4. Information and communications (CNAE 58-63);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;93.36 3.4. Information and communications (CNAE 58-63);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;80.11 3.4. Information and communications (CNAE 58-63);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;77.68 3.4. Information and communications (CNAE 58-63);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;83.55 3.4. Information and communications (CNAE 58-63);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;92.96 3.4. Information and communications (CNAE 58-63);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;12.95 3.4. Information and communications (CNAE 58-63);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;13.90 3.4. Information and communications (CNAE 58-63);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;12.91 3.4. Information and communications (CNAE 58-63);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;3.25 3.4. Information and communications (CNAE 58-63);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;6.94 3.4. Information and communications (CNAE 58-63);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;8.42 3.4. Information and communications (CNAE 58-63);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;3.54 3.4. Information and communications (CNAE 58-63);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;3.79 3.4. Information and communications (CNAE 58-63);H.5 % of enterprises that have experienced an ICT security incident (0);Total;26.60 3.4. Information and communications (CNAE 58-63);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;23.33 3.4. Information and communications (CNAE 58-63);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;35.16 3.4. Information and communications (CNAE 58-63);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;41.36 3.4. Information and communications (CNAE 58-63);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;76.26 3.4. Information and communications (CNAE 58-63);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;74.19 3.4. Information and communications (CNAE 58-63);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;80.39 3.4. Information and communications (CNAE 58-63);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;79.72 3.4. Information and communications (CNAE 58-63);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;34.65 3.4. Information and communications (CNAE 58-63);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;36.10 3.4. Information and communications (CNAE 58-63);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;33.19 3.4. Information and communications (CNAE 58-63);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;27.23 3.4. Information and communications (CNAE 58-63);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;31.69 3.4. Information and communications (CNAE 58-63);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;37.68 3.4. Information and communications (CNAE 58-63);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;18.25 3.4. Information and communications (CNAE 58-63);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;26.98 3.4. Information and communications (CNAE 58-63);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;24.19 3.4. Information and communications (CNAE 58-63);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;29.40 3.4. Information and communications (CNAE 58-63);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;13.46 3.4. Information and communications (CNAE 58-63);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;16.65 3.4. Information and communications (CNAE 58-63);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;7.74 3.4. Information and communications (CNAE 58-63);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;9.00 3.4. Information and communications (CNAE 58-63);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;4.69 3.4. Information and communications (CNAE 58-63);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;7.53 3.4. Information and communications (CNAE 58-63);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;7.73 3.4. Information and communications (CNAE 58-63);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;6.39 3.4. Information and communications (CNAE 58-63);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;8.79 3.4. Information and communications (CNAE 58-63);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;15.63 3.5. Real estate activities (CNAE 68);H.1 % of enterprises that apply some ICT security measure (0);Total;95.60 3.5. Real estate activities (CNAE 68);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;95.15 3.5. Real estate activities (CNAE 68);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;100.00 3.5. Real estate activities (CNAE 68);H.1 % of enterprises that apply some ICT security measure (0);250 or more;100.00 3.5. Real estate activities (CNAE 68);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;98.73 3.5. Real estate activities (CNAE 68);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;98.60 3.5. Real estate activities (CNAE 68);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;100.00 3.5. Real estate activities (CNAE 68);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;100.00 3.5. Real estate activities (CNAE 68);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;34.59 3.5. Real estate activities (CNAE 68);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;34.11 3.5. Real estate activities (CNAE 68);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;33.43 3.5. Real estate activities (CNAE 68);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;67.29 3.5. Real estate activities (CNAE 68);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;44.71 3.5. Real estate activities (CNAE 68);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;41.89 3.5. Real estate activities (CNAE 68);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;65.12 3.5. Real estate activities (CNAE 68);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;100.00 3.5. Real estate activities (CNAE 68);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;56.95 3.5. Real estate activities (CNAE 68);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;54.03 3.5. Real estate activities (CNAE 68);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;80.88 3.5. Real estate activities (CNAE 68);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;100.00 3.5. Real estate activities (CNAE 68);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;94.65 3.5. Real estate activities (CNAE 68);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;94.07 3.5. Real estate activities (CNAE 68);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;100.00 3.5. Real estate activities (CNAE 68);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;100.00 3.5. Real estate activities (CNAE 68);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;71.62 3.5. Real estate activities (CNAE 68);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;69.19 3.5. Real estate activities (CNAE 68);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;93.01 3.5. Real estate activities (CNAE 68);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;100.00 3.5. Real estate activities (CNAE 68);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;55.01 3.5. Real estate activities (CNAE 68);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;50.94 3.5. Real estate activities (CNAE 68);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;92.55 3.5. Real estate activities (CNAE 68);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;93.24 3.5. Real estate activities (CNAE 68);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;55.88 3.5. Real estate activities (CNAE 68);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;52.63 3.5. Real estate activities (CNAE 68);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;87.50 3.5. Real estate activities (CNAE 68);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;78.46 3.5. Real estate activities (CNAE 68);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;54.33 3.5. Real estate activities (CNAE 68);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;50.86 3.5. Real estate activities (CNAE 68);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;83.77 3.5. Real estate activities (CNAE 68);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;100.00 3.5. Real estate activities (CNAE 68);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;35.98 3.5. Real estate activities (CNAE 68);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;31.69 3.5. Real estate activities (CNAE 68);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;73.48 3.5. Real estate activities (CNAE 68);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;87.28 3.5. Real estate activities (CNAE 68);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;38.23 3.5. Real estate activities (CNAE 68);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;33.63 3.5. Real estate activities (CNAE 68);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;78.30 3.5. Real estate activities (CNAE 68);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;94.03 3.5. Real estate activities (CNAE 68);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;67.34 3.5. Real estate activities (CNAE 68);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;65.51 3.5. Real estate activities (CNAE 68);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;81.27 3.5. Real estate activities (CNAE 68);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;100.00 3.5. Real estate activities (CNAE 68);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;82.43 3.5. Real estate activities (CNAE 68);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;81.71 3.5. Real estate activities (CNAE 68);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;87.17 3.5. Real estate activities (CNAE 68);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;89.20 3.5. Real estate activities (CNAE 68);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;53.51 3.5. Real estate activities (CNAE 68);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;50.77 3.5. Real estate activities (CNAE 68);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;71.08 3.5. Real estate activities (CNAE 68);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;82.08 3.5. Real estate activities (CNAE 68);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;24.67 3.5. Real estate activities (CNAE 68);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;22.71 3.5. Real estate activities (CNAE 68);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;33.91 3.5. Real estate activities (CNAE 68);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;59.02 3.5. Real estate activities (CNAE 68);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;33.89 3.5. Real estate activities (CNAE 68);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;29.65 3.5. Real estate activities (CNAE 68);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;70.26 3.5. Real estate activities (CNAE 68);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;100.00 3.5. Real estate activities (CNAE 68);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;76.06 3.5. Real estate activities (CNAE 68);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;77.22 3.5. Real estate activities (CNAE 68);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;68.01 3.5. Real estate activities (CNAE 68);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;84.43 3.5. Real estate activities (CNAE 68);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;9.41 3.5. Real estate activities (CNAE 68);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;6.38 3.5. Real estate activities (CNAE 68);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;23.70 3.5. Real estate activities (CNAE 68);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;11.53 3.5. Real estate activities (CNAE 68);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;14.53 3.5. Real estate activities (CNAE 68);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;16.40 3.5. Real estate activities (CNAE 68);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;8.28 3.5. Real estate activities (CNAE 68);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;4.04 3.5. Real estate activities (CNAE 68);H.5 % of enterprises that have experienced an ICT security incident (0);Total;13.15 3.5. Real estate activities (CNAE 68);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;11.64 3.5. Real estate activities (CNAE 68);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;29.22 3.5. Real estate activities (CNAE 68);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;20.72 3.5. Real estate activities (CNAE 68);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;60.68 3.5. Real estate activities (CNAE 68);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;56.90 3.5. Real estate activities (CNAE 68);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;78.75 3.5. Real estate activities (CNAE 68);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;56.82 3.5. Real estate activities (CNAE 68);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;19.13 3.5. Real estate activities (CNAE 68);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;19.60 3.5. Real estate activities (CNAE 68);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;19.59 3.5. Real estate activities (CNAE 68);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;0.00 3.5. Real estate activities (CNAE 68);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;24.45 3.5. Real estate activities (CNAE 68);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;29.89 3.5. Real estate activities (CNAE 68);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;2.61 3.5. Real estate activities (CNAE 68);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;0.00 3.5. Real estate activities (CNAE 68);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;14.84 3.5. Real estate activities (CNAE 68);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;15.69 3.5. Real estate activities (CNAE 68);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;12.93 3.5. Real estate activities (CNAE 68);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;0.00 3.5. Real estate activities (CNAE 68);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;12.09 3.5. Real estate activities (CNAE 68);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;8.32 3.5. Real estate activities (CNAE 68);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;25.27 3.5. Real estate activities (CNAE 68);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;43.18 3.5. Real estate activities (CNAE 68);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;2.34 3.5. Real estate activities (CNAE 68);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;0.00 3.5. Real estate activities (CNAE 68);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;7.51 3.5. Real estate activities (CNAE 68);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;43.18 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1 % of enterprises that apply some ICT security measure (0);Total;97.80 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;97.72 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;97.91 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1 % of enterprises that apply some ICT security measure (0);250 or more;99.42 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;93.79 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;92.79 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;98.21 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;99.66 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;22.00 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;18.14 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;38.73 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;46.03 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;46.95 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;41.27 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;70.39 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;87.11 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;54.90 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;49.64 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;77.04 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;90.51 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;95.64 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;95.32 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;96.72 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;98.90 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;84.69 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;82.17 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;96.45 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;96.66 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;71.41 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;67.39 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;88.98 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;95.85 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;58.19 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;53.94 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;74.98 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;91.52 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;58.06 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;52.93 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;79.44 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;93.50 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;46.14 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;40.61 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;68.91 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;85.54 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;51.28 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;45.45 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;75.86 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;90.45 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;75.12 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;71.62 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;89.79 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;99.01 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;86.51 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;84.95 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;92.54 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;91.02 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;49.77 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;44.09 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;67.63 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;82.17 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;46.25 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;41.89 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;61.78 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;63.97 3.6. Professional, scientific and technical activities (CNAE 69-75);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;48.72 3.6. Professional, scientific and technical activities (CNAE 69-75);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;42.83 3.6. Professional, scientific and technical activities (CNAE 69-75);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;73.22 3.6. Professional, scientific and technical activities (CNAE 69-75);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;90.48 3.6. Professional, scientific and technical activities (CNAE 69-75);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;76.29 3.6. Professional, scientific and technical activities (CNAE 69-75);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;73.54 3.6. Professional, scientific and technical activities (CNAE 69-75);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;83.52 3.6. Professional, scientific and technical activities (CNAE 69-75);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;83.75 3.6. Professional, scientific and technical activities (CNAE 69-75);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;14.18 3.6. Professional, scientific and technical activities (CNAE 69-75);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;15.24 3.6. Professional, scientific and technical activities (CNAE 69-75);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;11.74 3.6. Professional, scientific and technical activities (CNAE 69-75);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;10.07 3.6. Professional, scientific and technical activities (CNAE 69-75);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;9.53 3.6. Professional, scientific and technical activities (CNAE 69-75);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;11.22 3.6. Professional, scientific and technical activities (CNAE 69-75);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;4.74 3.6. Professional, scientific and technical activities (CNAE 69-75);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;6.17 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5 % of enterprises that have experienced an ICT security incident (0);Total;23.21 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;21.99 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;28.18 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;32.54 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;66.67 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;66.03 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;67.06 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;75.97 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;18.46 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;16.36 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;25.02 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;29.50 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;16.21 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;15.31 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;20.17 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;16.61 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;11.21 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;10.94 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;12.42 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;11.15 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;10.47 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;8.59 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;17.97 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;14.40 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;6.18 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;5.62 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;7.11 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;12.27 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1 % of enterprises that apply some ICT security measure (0);Total;80.23 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;76.85 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;88.65 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1 % of enterprises that apply some ICT security measure (0);250 or more;97.57 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;90.97 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;90.24 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;91.77 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;95.96 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;20.66 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;18.28 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;23.03 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;37.70 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;34.97 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;31.16 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;37.46 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;65.76 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;42.88 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;39.53 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;46.66 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;65.68 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;87.98 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;85.46 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;94.25 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;95.95 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;61.55 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;55.89 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;71.97 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;89.18 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;42.82 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;36.67 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;52.66 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;76.90 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;35.37 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;30.86 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;39.13 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;69.53 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;32.78 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;27.22 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;40.25 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;67.37 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;28.21 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;23.44 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;32.84 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;62.74 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;28.92 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;21.97 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;40.52 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;66.16 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;62.29 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;59.40 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;66.74 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;78.78 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;75.25 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;72.78 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;75.84 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;92.19 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;40.92 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;36.08 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;45.24 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;66.95 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;46.65 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;46.92 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;43.94 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;50.80 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;28.17 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;23.72 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;34.78 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;64.19 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;70.70 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;67.66 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;72.30 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;82.16 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;18.90 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;19.72 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;22.13 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;9.95 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;10.40 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;12.62 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;5.57 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;7.89 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5 % of enterprises that have experienced an ICT security incident (0);Total;13.43 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;11.48 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;16.60 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;28.32 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;70.31 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;72.42 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;63.95 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;70.62 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;28.87 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;33.97 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;21.07 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;16.55 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;34.65 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;35.29 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;44.79 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;13.85 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;17.99 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;19.28 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;20.21 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;7.65 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;12.77 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;13.72 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;4.72 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;21.89 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;10.85 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;11.83 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;11.12 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;5.48 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1 % of enterprises that apply some ICT security measure (0);Total;98.17 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;97.61 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;99.89 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1 % of enterprises that apply some ICT security measure (0);250 or more;100.00 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;97.45 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;96.62 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;100.00 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;99.64 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;35.85 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;31.33 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;46.73 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;61.24 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;72.09 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;68.64 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;80.37 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;91.63 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;73.15 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;69.23 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;82.86 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;94.04 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;97.09 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;96.80 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;97.68 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;99.06 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;88.47 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;86.07 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;94.75 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;99.64 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;82.14 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;78.77 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;91.14 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;97.12 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;70.83 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;65.75 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;84.71 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;92.04 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;75.05 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;70.44 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;87.34 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;95.74 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;66.05 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;60.16 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;81.23 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;94.76 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;68.30 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;63.53 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;80.46 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;92.13 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;89.46 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;87.37 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;95.41 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;97.17 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;90.66 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;88.79 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;95.55 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;96.87 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;55.75 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;47.58 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;75.07 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;91.34 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;51.47 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;48.12 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;57.94 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;72.43 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;66.44 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;59.59 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;86.32 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;92.57 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;81.54 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;79.07 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;85.11 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;93.25 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;12.74 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;13.96 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;11.60 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;4.36 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;5.72 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;6.97 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;3.29 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;2.39 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5 % of enterprises that have experienced an ICT security incident (0);Total;26.43 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;24.71 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;30.71 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;36.05 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;74.95 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;74.67 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;75.82 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;74.91 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;34.95 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;37.31 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;30.32 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;25.32 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;32.09 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;37.78 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;17.46 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;22.28 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;23.34 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;27.34 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;13.39 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;15.20 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;9.68 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;9.98 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;8.93 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;9.00 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;7.99 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;5.96 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;11.62 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;17.57