Activity grouping (except CNAE 56, 64-66 and 95.1) Main variables Size of the enterprise Total Total Enterprises L.1 % of enterprises with internal security systems Total 86,99 Total Enterprises L.1 % of enterprises with internal security systems From 10 to 49 85,4 Total Enterprises L.1 % of enterprises with internal security systems From 50 to 249 94,45 Total Enterprises L.1 % of enterprises with internal security systems 250 or more 98,24 Total Enterprises L.1.A % of enterprises that apply strong password authentication (1) Total 94,22 Total Enterprises L.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 93,68 Total Enterprises L.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 96,37 Total Enterprises L.1.A % of enterprises that apply strong password authentication (1) 250 or more 98,23 Total Enterprises L.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 51,62 Total Enterprises L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 51,47 Total Enterprises L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 51,45 Total Enterprises L.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 56,57 Total Enterprises L.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 13,07 Total Enterprises L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 10,78 Total Enterprises L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 21,47 Total Enterprises L.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 33,44 Total Enterprises L.1.D % of enterprises that use external data backup (1) Total 62,3 Total Enterprises L.1.D % of enterprises that use external data backup (1) From 10 to 49 60,14 Total Enterprises L.1.D % of enterprises that use external data backup (1) From 50 to 249 70,86 Total Enterprises L.1.D % of enterprises that use external data backup (1) 250 or more 78,43 Total Enterprises L.1.E % of enterprises that use protocols to analyze security incidents (1) Total 41,13 Total Enterprises L.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 37,51 Total Enterprises L.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 54,72 Total Enterprises L.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 72,14 1. Total Industry (CNAE 10-39) L.1 % of enterprises with internal security systems Total 87,04 1. Total Industry (CNAE 10-39) L.1 % of enterprises with internal security systems From 10 to 49 84,96 1. Total Industry (CNAE 10-39) L.1 % of enterprises with internal security systems From 50 to 249 95,13 1. Total Industry (CNAE 10-39) L.1 % of enterprises with internal security systems 250 or more 98,64 1. Total Industry (CNAE 10-39) L.1.A % of enterprises that apply strong password authentication (1) Total 95,6 1. Total Industry (CNAE 10-39) L.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 95,26 1. Total Industry (CNAE 10-39) L.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 96,39 1. Total Industry (CNAE 10-39) L.1.A % of enterprises that apply strong password authentication (1) 250 or more 99,44 1. Total Industry (CNAE 10-39) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 51,58 1. Total Industry (CNAE 10-39) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 51,24 1. Total Industry (CNAE 10-39) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 52,27 1. Total Industry (CNAE 10-39) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 55,74 1. Total Industry (CNAE 10-39) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 13,76 1. Total Industry (CNAE 10-39) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 10,82 1. Total Industry (CNAE 10-39) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 23,08 1. Total Industry (CNAE 10-39) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 32,44 1. Total Industry (CNAE 10-39) L.1.D % of enterprises that use external data backup (1) Total 58,13 1. Total Industry (CNAE 10-39) L.1.D % of enterprises that use external data backup (1) From 10 to 49 54,84 1. Total Industry (CNAE 10-39) L.1.D % of enterprises that use external data backup (1) From 50 to 249 68,75 1. Total Industry (CNAE 10-39) L.1.D % of enterprises that use external data backup (1) 250 or more 78,2 1. Total Industry (CNAE 10-39) L.1.E % of enterprises that use protocols to analyze security incidents (1) Total 36,7 1. Total Industry (CNAE 10-39) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 31,51 1. Total Industry (CNAE 10-39) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 52 1. Total Industry (CNAE 10-39) L.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 75,53 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) L.1 % of enterprises with internal security systems Total 83,01 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) L.1 % of enterprises with internal security systems From 10 to 49 80,89 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) L.1 % of enterprises with internal security systems From 50 to 249 92,71 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) L.1 % of enterprises with internal security systems 250 or more 100 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) L.1.A % of enterprises that apply strong password authentication (1) Total 94,93 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) L.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 94,51 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) L.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 96,33 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) L.1.A % of enterprises that apply strong password authentication (1) 250 or more 99,08 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 53,6 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 53,95 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 51,97 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 52,54 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 14,41 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 11,29 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 27,37 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 31,57 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) L.1.D % of enterprises that use external data backup (1) Total 56,65 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) L.1.D % of enterprises that use external data backup (1) From 10 to 49 54,09 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) L.1.D % of enterprises that use external data backup (1) From 50 to 249 64,97 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) L.1.D % of enterprises that use external data backup (1) 250 or more 84,13 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) L.1.E % of enterprises that use protocols to analyze security incidents (1) Total 33,5 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 29,3 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 48,74 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) L.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 69,4 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) L.1 % of enterprises with internal security systems Total 88,75 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) L.1 % of enterprises with internal security systems From 10 to 49 86,23 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) L.1 % of enterprises with internal security systems From 50 to 249 95,45 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) L.1 % of enterprises with internal security systems 250 or more 99,05 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) L.1.A % of enterprises that apply strong password authentication (1) Total 97,13 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) L.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 96,28 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) L.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 99,23 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) L.1.A % of enterprises that apply strong password authentication (1) 250 or more 100 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 51,79 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 50,11 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 55,38 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 59,91 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 16,92 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 14,29 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 21,4 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 35,09 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) L.1.D % of enterprises that use external data backup (1) Total 64,21 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) L.1.D % of enterprises that use external data backup (1) From 10 to 49 60,91 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) L.1.D % of enterprises that use external data backup (1) From 50 to 249 70,96 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) L.1.D % of enterprises that use external data backup (1) 250 or more 81,72 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) L.1.E % of enterprises that use protocols to analyze security incidents (1) Total 41,49 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 34,14 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 55,55 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) L.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 84,94 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) L.1 % of enterprises with internal security systems Total 89,42 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) L.1 % of enterprises with internal security systems From 10 to 49 88,41 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) L.1 % of enterprises with internal security systems From 50 to 249 94,77 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) L.1 % of enterprises with internal security systems 250 or more 97,69 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) L.1.A % of enterprises that apply strong password authentication (1) Total 96,61 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) L.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 96,78 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) L.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 95,29 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) L.1.A % of enterprises that apply strong password authentication (1) 250 or more 98,92 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 51,23 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 51,16 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 51,93 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 49,1 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 7,94 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 6,15 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 16,61 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 22,55 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) L.1.D % of enterprises that use external data backup (1) Total 53,3 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) L.1.D % of enterprises that use external data backup (1) From 10 to 49 50,97 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) L.1.D % of enterprises that use external data backup (1) From 50 to 249 65,85 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) L.1.D % of enterprises that use external data backup (1) 250 or more 62,57 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) L.1.E % of enterprises that use protocols to analyze security incidents (1) Total 34,65 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 31,64 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 48,36 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) L.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 65,1 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) L.1 % of enterprises with internal security systems Total 90,17 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) L.1 % of enterprises with internal security systems From 10 to 49 88,23 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) L.1 % of enterprises with internal security systems From 50 to 249 97,37 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) L.1 % of enterprises with internal security systems 250 or more 97,15 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) L.1.A % of enterprises that apply strong password authentication (1) Total 94,74 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) L.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 94,46 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) L.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 94,86 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) L.1.A % of enterprises that apply strong password authentication (1) 250 or more 99,33 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 48,47 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 46,8 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 52,68 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 60,3 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 15,19 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 12,03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 23,95 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 34,24 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) L.1.D % of enterprises that use external data backup (1) Total 60,03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) L.1.D % of enterprises that use external data backup (1) From 10 to 49 55,68 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) L.1.D % of enterprises that use external data backup (1) From 50 to 249 74,46 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) L.1.D % of enterprises that use external data backup (1) 250 or more 75,23 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) L.1.E % of enterprises that use protocols to analyze security incidents (1) Total 38,87 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 33,03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 54,43 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) L.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 76,92 1.5. Energy and water (CNAE 35-39) L.1 % of enterprises with internal security systems Total 89,62 1.5. Energy and water (CNAE 35-39) L.1 % of enterprises with internal security systems From 10 to 49 86,08 1.5. Energy and water (CNAE 35-39) L.1 % of enterprises with internal security systems From 50 to 249 98,67 1.5. Energy and water (CNAE 35-39) L.1 % of enterprises with internal security systems 250 or more 99,07 1.5. Energy and water (CNAE 35-39) L.1.A % of enterprises that apply strong password authentication (1) Total 96,3 1.5. Energy and water (CNAE 35-39) L.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 95,84 1.5. Energy and water (CNAE 35-39) L.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 96,51 1.5. Energy and water (CNAE 35-39) L.1.A % of enterprises that apply strong password authentication (1) 250 or more 100 1.5. Energy and water (CNAE 35-39) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 52,36 1.5. Energy and water (CNAE 35-39) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 55,12 1.5. Energy and water (CNAE 35-39) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 44,65 1.5. Energy and water (CNAE 35-39) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 50,93 1.5. Energy and water (CNAE 35-39) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 13,79 1.5. Energy and water (CNAE 35-39) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 10,16 1.5. Energy and water (CNAE 35-39) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 18,22 1.5. Energy and water (CNAE 35-39) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 34,06 1.5. Energy and water (CNAE 35-39) L.1.D % of enterprises that use external data backup (1) Total 58,98 1.5. Energy and water (CNAE 35-39) L.1.D % of enterprises that use external data backup (1) From 10 to 49 54,7 1.5. Energy and water (CNAE 35-39) L.1.D % of enterprises that use external data backup (1) From 50 to 249 65,7 1.5. Energy and water (CNAE 35-39) L.1.D % of enterprises that use external data backup (1) 250 or more 78,04 1.5. Energy and water (CNAE 35-39) L.1.E % of enterprises that use protocols to analyze security incidents (1) Total 41,96 1.5. Energy and water (CNAE 35-39) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 33,31 1.5. Energy and water (CNAE 35-39) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 55,81 1.5. Energy and water (CNAE 35-39) L.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 79,44 2. Total Construction (CNAE 41-43) L.1 % of enterprises with internal security systems Total 82,4 2. Total Construction (CNAE 41-43) L.1 % of enterprises with internal security systems From 10 to 49 81,79 2. Total Construction (CNAE 41-43) L.1 % of enterprises with internal security systems From 50 to 249 88,79 2. Total Construction (CNAE 41-43) L.1 % of enterprises with internal security systems 250 or more 100 2. Total Construction (CNAE 41-43) L.1.A % of enterprises that apply strong password authentication (1) Total 90,53 2. Total Construction (CNAE 41-43) L.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 89,89 2. Total Construction (CNAE 41-43) L.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 97,46 2. Total Construction (CNAE 41-43) L.1.A % of enterprises that apply strong password authentication (1) 250 or more 100 2. Total Construction (CNAE 41-43) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 50,8 2. Total Construction (CNAE 41-43) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 51,6 2. Total Construction (CNAE 41-43) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 40,87 2. Total Construction (CNAE 41-43) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 49,05 2. Total Construction (CNAE 41-43) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 7,83 2. Total Construction (CNAE 41-43) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 7,48 2. Total Construction (CNAE 41-43) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 8,98 2. Total Construction (CNAE 41-43) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 33,5 2. Total Construction (CNAE 41-43) L.1.D % of enterprises that use external data backup (1) Total 55,94 2. Total Construction (CNAE 41-43) L.1.D % of enterprises that use external data backup (1) From 10 to 49 55,86 2. Total Construction (CNAE 41-43) L.1.D % of enterprises that use external data backup (1) From 50 to 249 53,51 2. Total Construction (CNAE 41-43) L.1.D % of enterprises that use external data backup (1) 250 or more 82,79 2. Total Construction (CNAE 41-43) L.1.E % of enterprises that use protocols to analyze security incidents (1) Total 31,8 2. Total Construction (CNAE 41-43) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 30,21 2. Total Construction (CNAE 41-43) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 47,18 2. Total Construction (CNAE 41-43) L.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 68,52 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) L.1 % of enterprises with internal security systems Total 87,97 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) L.1 % of enterprises with internal security systems From 10 to 49 86,47 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) L.1 % of enterprises with internal security systems From 50 to 249 94,68 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) L.1 % of enterprises with internal security systems 250 or more 97,95 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) L.1.A % of enterprises that apply strong password authentication (1) Total 94,37 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) L.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 93,89 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) L.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 96,25 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) L.1.A % of enterprises that apply strong password authentication (1) 250 or more 97,56 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 51,81 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 51,54 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 52,06 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 57,4 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 13,84 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 11,53 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 21,86 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 33,92 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) L.1.D % of enterprises that use external data backup (1) Total 65,43 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) L.1.D % of enterprises that use external data backup (1) From 10 to 49 63,37 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) L.1.D % of enterprises that use external data backup (1) From 50 to 249 73,6 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) L.1.D % of enterprises that use external data backup (1) 250 or more 78,28 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) L.1.E % of enterprises that use protocols to analyze security incidents (1) Total 44,99 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 41,73 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 56,83 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) L.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 70,75 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) L.1 % of enterprises with internal security systems Total 87,96 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) L.1 % of enterprises with internal security systems From 10 to 49 86,8 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) L.1 % of enterprises with internal security systems From 50 to 249 94,63 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) L.1 % of enterprises with internal security systems 250 or more 99,22 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) L.1.A % of enterprises that apply strong password authentication (1) Total 93,91 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) L.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 93,15 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) L.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 98,26 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) L.1.A % of enterprises that apply strong password authentication (1) 250 or more 97,89 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 52,34 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 51,64 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 56,1 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 57,57 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 11,5 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 9,11 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 23,15 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 36,74 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) L.1.D % of enterprises that use external data backup (1) Total 63,91 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) L.1.D % of enterprises that use external data backup (1) From 10 to 49 62,02 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) L.1.D % of enterprises that use external data backup (1) From 50 to 249 74,38 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) L.1.D % of enterprises that use external data backup (1) 250 or more 76,42 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) L.1.E % of enterprises that use protocols to analyze security incidents (1) Total 40,85 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 37,82 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 56,25 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) L.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 69,38 3.2. Transport and storage (CNAE 49-53) L.1 % of enterprises with internal security systems Total 84,42 3.2. Transport and storage (CNAE 49-53) L.1 % of enterprises with internal security systems From 10 to 49 81,81 3.2. Transport and storage (CNAE 49-53) L.1 % of enterprises with internal security systems From 50 to 249 96,48 3.2. Transport and storage (CNAE 49-53) L.1 % of enterprises with internal security systems 250 or more 98,46 3.2. Transport and storage (CNAE 49-53) L.1.A % of enterprises that apply strong password authentication (1) Total 90,72 3.2. Transport and storage (CNAE 49-53) L.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 90,36 3.2. Transport and storage (CNAE 49-53) L.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 90,88 3.2. Transport and storage (CNAE 49-53) L.1.A % of enterprises that apply strong password authentication (1) 250 or more 100 3.2. Transport and storage (CNAE 49-53) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 49,91 3.2. Transport and storage (CNAE 49-53) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 50,52 3.2. Transport and storage (CNAE 49-53) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 46,87 3.2. Transport and storage (CNAE 49-53) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 51,37 3.2. Transport and storage (CNAE 49-53) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 11,61 3.2. Transport and storage (CNAE 49-53) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 9,36 3.2. Transport and storage (CNAE 49-53) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 19,19 3.2. Transport and storage (CNAE 49-53) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 29,3 3.2. Transport and storage (CNAE 49-53) L.1.D % of enterprises that use external data backup (1) Total 57,36 3.2. Transport and storage (CNAE 49-53) L.1.D % of enterprises that use external data backup (1) From 10 to 49 53,43 3.2. Transport and storage (CNAE 49-53) L.1.D % of enterprises that use external data backup (1) From 50 to 249 71,24 3.2. Transport and storage (CNAE 49-53) L.1.D % of enterprises that use external data backup (1) 250 or more 84,15 3.2. Transport and storage (CNAE 49-53) L.1.E % of enterprises that use protocols to analyze security incidents (1) Total 39,96 3.2. Transport and storage (CNAE 49-53) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 36,97 3.2. Transport and storage (CNAE 49-53) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 48,75 3.2. Transport and storage (CNAE 49-53) L.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 71,49 3.3. Accommodation services (CNAE 55) L.1 % of enterprises with internal security systems Total 92,65 3.3. Accommodation services (CNAE 55) L.1 % of enterprises with internal security systems From 10 to 49 90,9 3.3. Accommodation services (CNAE 55) L.1 % of enterprises with internal security systems From 50 to 249 98,49 3.3. Accommodation services (CNAE 55) L.1 % of enterprises with internal security systems 250 or more 100 3.3. Accommodation services (CNAE 55) L.1.A % of enterprises that apply strong password authentication (1) Total 95,76 3.3. Accommodation services (CNAE 55) L.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 95,25 3.3. Accommodation services (CNAE 55) L.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 97,61 3.3. Accommodation services (CNAE 55) L.1.A % of enterprises that apply strong password authentication (1) 250 or more 96,12 3.3. Accommodation services (CNAE 55) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 51,13 3.3. Accommodation services (CNAE 55) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 51,3 3.3. Accommodation services (CNAE 55) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 50,88 3.3. Accommodation services (CNAE 55) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 48,78 3.3. Accommodation services (CNAE 55) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 15,79 3.3. Accommodation services (CNAE 55) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 13,98 3.3. Accommodation services (CNAE 55) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 20,26 3.3. Accommodation services (CNAE 55) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 30,25 3.3. Accommodation services (CNAE 55) L.1.D % of enterprises that use external data backup (1) Total 65,8 3.3. Accommodation services (CNAE 55) L.1.D % of enterprises that use external data backup (1) From 10 to 49 64,41 3.3. Accommodation services (CNAE 55) L.1.D % of enterprises that use external data backup (1) From 50 to 249 70,13 3.3. Accommodation services (CNAE 55) L.1.D % of enterprises that use external data backup (1) 250 or more 70,73 3.3. Accommodation services (CNAE 55) L.1.E % of enterprises that use protocols to analyze security incidents (1) Total 49,18 3.3. Accommodation services (CNAE 55) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 46,7 3.3. Accommodation services (CNAE 55) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 56,23 3.3. Accommodation services (CNAE 55) L.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 63,03 3.4. Information and communications (CNAE 58-63) L.1 % of enterprises with internal security systems Total 95,45 3.4. Information and communications (CNAE 58-63) L.1 % of enterprises with internal security systems From 10 to 49 94,58 3.4. Information and communications (CNAE 58-63) L.1 % of enterprises with internal security systems From 50 to 249 98,65 3.4. Information and communications (CNAE 58-63) L.1 % of enterprises with internal security systems 250 or more 96,97 3.4. Information and communications (CNAE 58-63) L.1.A % of enterprises that apply strong password authentication (1) Total 97,86 3.4. Information and communications (CNAE 58-63) L.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 97,55 3.4. Information and communications (CNAE 58-63) L.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 99,03 3.4. Information and communications (CNAE 58-63) L.1.A % of enterprises that apply strong password authentication (1) 250 or more 97,95 3.4. Information and communications (CNAE 58-63) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 53,36 3.4. Information and communications (CNAE 58-63) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 52,06 3.4. Information and communications (CNAE 58-63) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 53,75 3.4. Information and communications (CNAE 58-63) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 72,84 3.4. Information and communications (CNAE 58-63) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 26,76 3.4. Information and communications (CNAE 58-63) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 24,89 3.4. Information and communications (CNAE 58-63) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 31,06 3.4. Information and communications (CNAE 58-63) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 39,13 3.4. Information and communications (CNAE 58-63) L.1.D % of enterprises that use external data backup (1) Total 83,74 3.4. Information and communications (CNAE 58-63) L.1.D % of enterprises that use external data backup (1) From 10 to 49 83,22 3.4. Information and communications (CNAE 58-63) L.1.D % of enterprises that use external data backup (1) From 50 to 249 83,96 3.4. Information and communications (CNAE 58-63) L.1.D % of enterprises that use external data backup (1) 250 or more 91,17 3.4. Information and communications (CNAE 58-63) L.1.E % of enterprises that use protocols to analyze security incidents (1) Total 68,28 3.4. Information and communications (CNAE 58-63) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 64,27 3.4. Information and communications (CNAE 58-63) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 77,74 3.4. Information and communications (CNAE 58-63) L.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 93,89 3.5. Real estate activities (CNAE 68) L.1 % of enterprises with internal security systems Total 90,4 3.5. Real estate activities (CNAE 68) L.1 % of enterprises with internal security systems From 10 to 49 89,53 3.5. Real estate activities (CNAE 68) L.1 % of enterprises with internal security systems From 50 to 249 98,81 3.5. Real estate activities (CNAE 68) L.1 % of enterprises with internal security systems 250 or more 100 3.5. Real estate activities (CNAE 68) L.1.A % of enterprises that apply strong password authentication (1) Total 98,45 3.5. Real estate activities (CNAE 68) L.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 98,39 3.5. Real estate activities (CNAE 68) L.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 98,79 3.5. Real estate activities (CNAE 68) L.1.A % of enterprises that apply strong password authentication (1) 250 or more 100 3.5. Real estate activities (CNAE 68) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 55,54 3.5. Real estate activities (CNAE 68) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 55,2 3.5. Real estate activities (CNAE 68) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 59,52 3.5. Real estate activities (CNAE 68) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 54 3.5. Real estate activities (CNAE 68) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 14,49 3.5. Real estate activities (CNAE 68) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 11,83 3.5. Real estate activities (CNAE 68) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 35,5 3.5. Real estate activities (CNAE 68) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 51,89 3.5. Real estate activities (CNAE 68) L.1.D % of enterprises that use external data backup (1) Total 76,33 3.5. Real estate activities (CNAE 68) L.1.D % of enterprises that use external data backup (1) From 10 to 49 76,75 3.5. Real estate activities (CNAE 68) L.1.D % of enterprises that use external data backup (1) From 50 to 249 73,51 3.5. Real estate activities (CNAE 68) L.1.D % of enterprises that use external data backup (1) 250 or more 67,92 3.5. Real estate activities (CNAE 68) L.1.E % of enterprises that use protocols to analyze security incidents (1) Total 50,03 3.5. Real estate activities (CNAE 68) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 48,07 3.5. Real estate activities (CNAE 68) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 61,04 3.5. Real estate activities (CNAE 68) L.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 100 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) L.1 % of enterprises with internal security systems Total 94,18 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) L.1 % of enterprises with internal security systems From 10 to 49 93,36 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) L.1 % of enterprises with internal security systems From 50 to 249 98,27 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) L.1 % of enterprises with internal security systems 250 or more 98,26 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) L.1.A % of enterprises that apply strong password authentication (1) Total 97,34 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) L.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 97 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) L.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 98,76 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) L.1.A % of enterprises that apply strong password authentication (1) 250 or more 100 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 50,87 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 50,97 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 49,04 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 57,21 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 18,19 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 15,86 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 27,03 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 40,3 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) L.1.D % of enterprises that use external data backup (1) Total 75,33 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) L.1.D % of enterprises that use external data backup (1) From 10 to 49 73,69 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) L.1.D % of enterprises that use external data backup (1) From 50 to 249 83,18 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) L.1.D % of enterprises that use external data backup (1) 250 or more 82,66 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) L.1.E % of enterprises that use protocols to analyze security incidents (1) Total 56,54 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 53,75 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 68,26 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) L.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 77,23 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) L.1 % of enterprises with internal security systems Total 79,93 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) L.1 % of enterprises with internal security systems From 10 to 49 77 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) L.1 % of enterprises with internal security systems From 50 to 249 87,13 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) L.1 % of enterprises with internal security systems 250 or more 96,29 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) L.1.A % of enterprises that apply strong password authentication (1) Total 92,98 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) L.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 93,01 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) L.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 91,99 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) L.1.A % of enterprises that apply strong password authentication (1) 250 or more 95,33 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 51,86 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 52,11 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 49,35 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 56,08 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 11,14 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 9,2 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 12,19 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 28,31 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) L.1.D % of enterprises that use external data backup (1) Total 55,85 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) L.1.D % of enterprises that use external data backup (1) From 10 to 49 52,47 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) L.1.D % of enterprises that use external data backup (1) From 50 to 249 62,26 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) L.1.D % of enterprises that use external data backup (1) 250 or more 73,49 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) L.1.E % of enterprises that use protocols to analyze security incidents (1) Total 35,84 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 31,07 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 44,5 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) L.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 61,67 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) L.1 % of enterprises with internal security systems Total 98,09 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) L.1 % of enterprises with internal security systems From 10 to 49 97,73 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) L.1 % of enterprises with internal security systems From 50 to 249 100 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) L.1 % of enterprises with internal security systems 250 or more 95,88 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) L.1.A % of enterprises that apply strong password authentication (1) Total 98,5 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) L.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 98,51 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) L.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 98,54 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) L.1.A % of enterprises that apply strong password authentication (1) 250 or more 98,02 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 54,82 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 52,99 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 57,5 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) L.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 72,37 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 30,66 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 28,87 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 34,96 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) L.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 40,8 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) L.1.D % of enterprises that use external data backup (1) Total 83,48 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) L.1.D % of enterprises that use external data backup (1) From 10 to 49 82,89 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) L.1.D % of enterprises that use external data backup (1) From 50 to 249 84,68 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) L.1.D % of enterprises that use external data backup (1) 250 or more 87,83 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) L.1.E % of enterprises that use protocols to analyze security incidents (1) Total 67,19 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 62,82 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) L.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 77,82 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) L.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 91,11