Activity grouping (except CNAE 56, 64-66 and 95.1);Main variables;Size of the enterprise;Total Total Enterprises;L.1 % of enterprises with internal security systems;Total;86,99 Total Enterprises;L.1 % of enterprises with internal security systems;From 10 to 49;85,4 Total Enterprises;L.1 % of enterprises with internal security systems;From 50 to 249;94,45 Total Enterprises;L.1 % of enterprises with internal security systems;250 or more;98,24 Total Enterprises;L.1.A % of enterprises that apply strong password authentication (1);Total;94,22 Total Enterprises;L.1.A % of enterprises that apply strong password authentication (1);From 10 to 49;93,68 Total Enterprises;L.1.A % of enterprises that apply strong password authentication (1);From 50 to 249;96,37 Total Enterprises;L.1.A % of enterprises that apply strong password authentication (1);250 or more;98,23 Total Enterprises;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total;51,62 Total Enterprises;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 10 to 49;51,47 Total Enterprises;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 50 to 249;51,45 Total Enterprises;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);250 or more;56,57 Total Enterprises;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total;13,07 Total Enterprises;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 10 to 49;10,78 Total Enterprises;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 50 to 249;21,47 Total Enterprises;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);250 or more;33,44 Total Enterprises;L.1.D % of enterprises that use external data backup (1);Total;62,3 Total Enterprises;L.1.D % of enterprises that use external data backup (1);From 10 to 49;60,14 Total Enterprises;L.1.D % of enterprises that use external data backup (1);From 50 to 249;70,86 Total Enterprises;L.1.D % of enterprises that use external data backup (1);250 or more;78,43 Total Enterprises;L.1.E % of enterprises that use protocols to analyze security incidents (1);Total;41,13 Total Enterprises;L.1.E % of enterprises that use protocols to analyze security incidents (1);From 10 to 49;37,51 Total Enterprises;L.1.E % of enterprises that use protocols to analyze security incidents (1);From 50 to 249;54,72 Total Enterprises;L.1.E % of enterprises that use protocols to analyze security incidents (1);250 or more;72,14 1. Total Industry (CNAE 10-39);L.1 % of enterprises with internal security systems;Total;87,04 1. Total Industry (CNAE 10-39);L.1 % of enterprises with internal security systems;From 10 to 49;84,96 1. Total Industry (CNAE 10-39);L.1 % of enterprises with internal security systems;From 50 to 249;95,13 1. Total Industry (CNAE 10-39);L.1 % of enterprises with internal security systems;250 or more;98,64 1. Total Industry (CNAE 10-39);L.1.A % of enterprises that apply strong password authentication (1);Total;95,6 1. Total Industry (CNAE 10-39);L.1.A % of enterprises that apply strong password authentication (1);From 10 to 49;95,26 1. Total Industry (CNAE 10-39);L.1.A % of enterprises that apply strong password authentication (1);From 50 to 249;96,39 1. Total Industry (CNAE 10-39);L.1.A % of enterprises that apply strong password authentication (1);250 or more;99,44 1. Total Industry (CNAE 10-39);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total;51,58 1. Total Industry (CNAE 10-39);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 10 to 49;51,24 1. Total Industry (CNAE 10-39);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 50 to 249;52,27 1. Total Industry (CNAE 10-39);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);250 or more;55,74 1. Total Industry (CNAE 10-39);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total;13,76 1. Total Industry (CNAE 10-39);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 10 to 49;10,82 1. Total Industry (CNAE 10-39);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 50 to 249;23,08 1. Total Industry (CNAE 10-39);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);250 or more;32,44 1. Total Industry (CNAE 10-39);L.1.D % of enterprises that use external data backup (1);Total;58,13 1. Total Industry (CNAE 10-39);L.1.D % of enterprises that use external data backup (1);From 10 to 49;54,84 1. Total Industry (CNAE 10-39);L.1.D % of enterprises that use external data backup (1);From 50 to 249;68,75 1. Total Industry (CNAE 10-39);L.1.D % of enterprises that use external data backup (1);250 or more;78,2 1. Total Industry (CNAE 10-39);L.1.E % of enterprises that use protocols to analyze security incidents (1);Total;36,7 1. Total Industry (CNAE 10-39);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 10 to 49;31,51 1. Total Industry (CNAE 10-39);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 50 to 249;52 1. Total Industry (CNAE 10-39);L.1.E % of enterprises that use protocols to analyze security incidents (1);250 or more;75,53 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);L.1 % of enterprises with internal security systems;Total;83,01 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);L.1 % of enterprises with internal security systems;From 10 to 49;80,89 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);L.1 % of enterprises with internal security systems;From 50 to 249;92,71 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);L.1 % of enterprises with internal security systems;250 or more;100 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);L.1.A % of enterprises that apply strong password authentication (1);Total;94,93 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);L.1.A % of enterprises that apply strong password authentication (1);From 10 to 49;94,51 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);L.1.A % of enterprises that apply strong password authentication (1);From 50 to 249;96,33 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);L.1.A % of enterprises that apply strong password authentication (1);250 or more;99,08 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total;53,6 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 10 to 49;53,95 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 50 to 249;51,97 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);250 or more;52,54 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total;14,41 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 10 to 49;11,29 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 50 to 249;27,37 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);250 or more;31,57 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);L.1.D % of enterprises that use external data backup (1);Total;56,65 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);L.1.D % of enterprises that use external data backup (1);From 10 to 49;54,09 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);L.1.D % of enterprises that use external data backup (1);From 50 to 249;64,97 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);L.1.D % of enterprises that use external data backup (1);250 or more;84,13 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);L.1.E % of enterprises that use protocols to analyze security incidents (1);Total;33,5 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 10 to 49;29,3 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 50 to 249;48,74 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);L.1.E % of enterprises that use protocols to analyze security incidents (1);250 or more;69,4 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);L.1 % of enterprises with internal security systems;Total;88,75 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);L.1 % of enterprises with internal security systems;From 10 to 49;86,23 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);L.1 % of enterprises with internal security systems;From 50 to 249;95,45 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);L.1 % of enterprises with internal security systems;250 or more;99,05 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);L.1.A % of enterprises that apply strong password authentication (1);Total;97,13 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);L.1.A % of enterprises that apply strong password authentication (1);From 10 to 49;96,28 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);L.1.A % of enterprises that apply strong password authentication (1);From 50 to 249;99,23 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);L.1.A % of enterprises that apply strong password authentication (1);250 or more;100 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total;51,79 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 10 to 49;50,11 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 50 to 249;55,38 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);250 or more;59,91 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total;16,92 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 10 to 49;14,29 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 50 to 249;21,4 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);250 or more;35,09 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);L.1.D % of enterprises that use external data backup (1);Total;64,21 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);L.1.D % of enterprises that use external data backup (1);From 10 to 49;60,91 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);L.1.D % of enterprises that use external data backup (1);From 50 to 249;70,96 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);L.1.D % of enterprises that use external data backup (1);250 or more;81,72 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);L.1.E % of enterprises that use protocols to analyze security incidents (1);Total;41,49 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 10 to 49;34,14 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 50 to 249;55,55 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);L.1.E % of enterprises that use protocols to analyze security incidents (1);250 or more;84,94 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);L.1 % of enterprises with internal security systems;Total;89,42 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);L.1 % of enterprises with internal security systems;From 10 to 49;88,41 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);L.1 % of enterprises with internal security systems;From 50 to 249;94,77 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);L.1 % of enterprises with internal security systems;250 or more;97,69 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);L.1.A % of enterprises that apply strong password authentication (1);Total;96,61 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);L.1.A % of enterprises that apply strong password authentication (1);From 10 to 49;96,78 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);L.1.A % of enterprises that apply strong password authentication (1);From 50 to 249;95,29 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);L.1.A % of enterprises that apply strong password authentication (1);250 or more;98,92 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total;51,23 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 10 to 49;51,16 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 50 to 249;51,93 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);250 or more;49,1 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total;7,94 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 10 to 49;6,15 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 50 to 249;16,61 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);250 or more;22,55 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);L.1.D % of enterprises that use external data backup (1);Total;53,3 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);L.1.D % of enterprises that use external data backup (1);From 10 to 49;50,97 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);L.1.D % of enterprises that use external data backup (1);From 50 to 249;65,85 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);L.1.D % of enterprises that use external data backup (1);250 or more;62,57 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);L.1.E % of enterprises that use protocols to analyze security incidents (1);Total;34,65 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 10 to 49;31,64 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 50 to 249;48,36 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);L.1.E % of enterprises that use protocols to analyze security incidents (1);250 or more;65,1 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);L.1 % of enterprises with internal security systems;Total;90,17 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);L.1 % of enterprises with internal security systems;From 10 to 49;88,23 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);L.1 % of enterprises with internal security systems;From 50 to 249;97,37 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);L.1 % of enterprises with internal security systems;250 or more;97,15 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);L.1.A % of enterprises that apply strong password authentication (1);Total;94,74 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);L.1.A % of enterprises that apply strong password authentication (1);From 10 to 49;94,46 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);L.1.A % of enterprises that apply strong password authentication (1);From 50 to 249;94,86 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);L.1.A % of enterprises that apply strong password authentication (1);250 or more;99,33 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total;48,47 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 10 to 49;46,8 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 50 to 249;52,68 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);250 or more;60,3 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total;15,19 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 10 to 49;12,03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 50 to 249;23,95 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);250 or more;34,24 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);L.1.D % of enterprises that use external data backup (1);Total;60,03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);L.1.D % of enterprises that use external data backup (1);From 10 to 49;55,68 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);L.1.D % of enterprises that use external data backup (1);From 50 to 249;74,46 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);L.1.D % of enterprises that use external data backup (1);250 or more;75,23 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);L.1.E % of enterprises that use protocols to analyze security incidents (1);Total;38,87 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 10 to 49;33,03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 50 to 249;54,43 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);L.1.E % of enterprises that use protocols to analyze security incidents (1);250 or more;76,92 1.5. Energy and water (CNAE 35-39);L.1 % of enterprises with internal security systems;Total;89,62 1.5. Energy and water (CNAE 35-39);L.1 % of enterprises with internal security systems;From 10 to 49;86,08 1.5. Energy and water (CNAE 35-39);L.1 % of enterprises with internal security systems;From 50 to 249;98,67 1.5. Energy and water (CNAE 35-39);L.1 % of enterprises with internal security systems;250 or more;99,07 1.5. Energy and water (CNAE 35-39);L.1.A % of enterprises that apply strong password authentication (1);Total;96,3 1.5. Energy and water (CNAE 35-39);L.1.A % of enterprises that apply strong password authentication (1);From 10 to 49;95,84 1.5. Energy and water (CNAE 35-39);L.1.A % of enterprises that apply strong password authentication (1);From 50 to 249;96,51 1.5. Energy and water (CNAE 35-39);L.1.A % of enterprises that apply strong password authentication (1);250 or more;100 1.5. Energy and water (CNAE 35-39);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total;52,36 1.5. Energy and water (CNAE 35-39);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 10 to 49;55,12 1.5. Energy and water (CNAE 35-39);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 50 to 249;44,65 1.5. Energy and water (CNAE 35-39);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);250 or more;50,93 1.5. Energy and water (CNAE 35-39);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total;13,79 1.5. Energy and water (CNAE 35-39);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 10 to 49;10,16 1.5. Energy and water (CNAE 35-39);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 50 to 249;18,22 1.5. Energy and water (CNAE 35-39);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);250 or more;34,06 1.5. Energy and water (CNAE 35-39);L.1.D % of enterprises that use external data backup (1);Total;58,98 1.5. Energy and water (CNAE 35-39);L.1.D % of enterprises that use external data backup (1);From 10 to 49;54,7 1.5. Energy and water (CNAE 35-39);L.1.D % of enterprises that use external data backup (1);From 50 to 249;65,7 1.5. Energy and water (CNAE 35-39);L.1.D % of enterprises that use external data backup (1);250 or more;78,04 1.5. Energy and water (CNAE 35-39);L.1.E % of enterprises that use protocols to analyze security incidents (1);Total;41,96 1.5. Energy and water (CNAE 35-39);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 10 to 49;33,31 1.5. Energy and water (CNAE 35-39);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 50 to 249;55,81 1.5. Energy and water (CNAE 35-39);L.1.E % of enterprises that use protocols to analyze security incidents (1);250 or more;79,44 2. Total Construction (CNAE 41-43);L.1 % of enterprises with internal security systems;Total;82,4 2. Total Construction (CNAE 41-43);L.1 % of enterprises with internal security systems;From 10 to 49;81,79 2. Total Construction (CNAE 41-43);L.1 % of enterprises with internal security systems;From 50 to 249;88,79 2. Total Construction (CNAE 41-43);L.1 % of enterprises with internal security systems;250 or more;100 2. Total Construction (CNAE 41-43);L.1.A % of enterprises that apply strong password authentication (1);Total;90,53 2. Total Construction (CNAE 41-43);L.1.A % of enterprises that apply strong password authentication (1);From 10 to 49;89,89 2. Total Construction (CNAE 41-43);L.1.A % of enterprises that apply strong password authentication (1);From 50 to 249;97,46 2. Total Construction (CNAE 41-43);L.1.A % of enterprises that apply strong password authentication (1);250 or more;100 2. Total Construction (CNAE 41-43);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total;50,8 2. Total Construction (CNAE 41-43);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 10 to 49;51,6 2. Total Construction (CNAE 41-43);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 50 to 249;40,87 2. Total Construction (CNAE 41-43);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);250 or more;49,05 2. Total Construction (CNAE 41-43);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total;7,83 2. Total Construction (CNAE 41-43);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 10 to 49;7,48 2. Total Construction (CNAE 41-43);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 50 to 249;8,98 2. Total Construction (CNAE 41-43);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);250 or more;33,5 2. Total Construction (CNAE 41-43);L.1.D % of enterprises that use external data backup (1);Total;55,94 2. Total Construction (CNAE 41-43);L.1.D % of enterprises that use external data backup (1);From 10 to 49;55,86 2. Total Construction (CNAE 41-43);L.1.D % of enterprises that use external data backup (1);From 50 to 249;53,51 2. Total Construction (CNAE 41-43);L.1.D % of enterprises that use external data backup (1);250 or more;82,79 2. Total Construction (CNAE 41-43);L.1.E % of enterprises that use protocols to analyze security incidents (1);Total;31,8 2. Total Construction (CNAE 41-43);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 10 to 49;30,21 2. Total Construction (CNAE 41-43);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 50 to 249;47,18 2. Total Construction (CNAE 41-43);L.1.E % of enterprises that use protocols to analyze security incidents (1);250 or more;68,52 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);L.1 % of enterprises with internal security systems;Total;87,97 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);L.1 % of enterprises with internal security systems;From 10 to 49;86,47 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);L.1 % of enterprises with internal security systems;From 50 to 249;94,68 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);L.1 % of enterprises with internal security systems;250 or more;97,95 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);L.1.A % of enterprises that apply strong password authentication (1);Total;94,37 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);L.1.A % of enterprises that apply strong password authentication (1);From 10 to 49;93,89 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);L.1.A % of enterprises that apply strong password authentication (1);From 50 to 249;96,25 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);L.1.A % of enterprises that apply strong password authentication (1);250 or more;97,56 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total;51,81 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 10 to 49;51,54 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 50 to 249;52,06 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);250 or more;57,4 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total;13,84 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 10 to 49;11,53 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 50 to 249;21,86 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);250 or more;33,92 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);L.1.D % of enterprises that use external data backup (1);Total;65,43 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);L.1.D % of enterprises that use external data backup (1);From 10 to 49;63,37 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);L.1.D % of enterprises that use external data backup (1);From 50 to 249;73,6 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);L.1.D % of enterprises that use external data backup (1);250 or more;78,28 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);L.1.E % of enterprises that use protocols to analyze security incidents (1);Total;44,99 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 10 to 49;41,73 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 50 to 249;56,83 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);L.1.E % of enterprises that use protocols to analyze security incidents (1);250 or more;70,75 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);L.1 % of enterprises with internal security systems;Total;87,96 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);L.1 % of enterprises with internal security systems;From 10 to 49;86,8 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);L.1 % of enterprises with internal security systems;From 50 to 249;94,63 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);L.1 % of enterprises with internal security systems;250 or more;99,22 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);L.1.A % of enterprises that apply strong password authentication (1);Total;93,91 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);L.1.A % of enterprises that apply strong password authentication (1);From 10 to 49;93,15 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);L.1.A % of enterprises that apply strong password authentication (1);From 50 to 249;98,26 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);L.1.A % of enterprises that apply strong password authentication (1);250 or more;97,89 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total;52,34 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 10 to 49;51,64 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 50 to 249;56,1 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);250 or more;57,57 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total;11,5 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 10 to 49;9,11 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 50 to 249;23,15 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);250 or more;36,74 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);L.1.D % of enterprises that use external data backup (1);Total;63,91 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);L.1.D % of enterprises that use external data backup (1);From 10 to 49;62,02 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);L.1.D % of enterprises that use external data backup (1);From 50 to 249;74,38 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);L.1.D % of enterprises that use external data backup (1);250 or more;76,42 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);L.1.E % of enterprises that use protocols to analyze security incidents (1);Total;40,85 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 10 to 49;37,82 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 50 to 249;56,25 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);L.1.E % of enterprises that use protocols to analyze security incidents (1);250 or more;69,38 3.2. Transport and storage (CNAE 49-53);L.1 % of enterprises with internal security systems;Total;84,42 3.2. Transport and storage (CNAE 49-53);L.1 % of enterprises with internal security systems;From 10 to 49;81,81 3.2. Transport and storage (CNAE 49-53);L.1 % of enterprises with internal security systems;From 50 to 249;96,48 3.2. Transport and storage (CNAE 49-53);L.1 % of enterprises with internal security systems;250 or more;98,46 3.2. Transport and storage (CNAE 49-53);L.1.A % of enterprises that apply strong password authentication (1);Total;90,72 3.2. Transport and storage (CNAE 49-53);L.1.A % of enterprises that apply strong password authentication (1);From 10 to 49;90,36 3.2. Transport and storage (CNAE 49-53);L.1.A % of enterprises that apply strong password authentication (1);From 50 to 249;90,88 3.2. Transport and storage (CNAE 49-53);L.1.A % of enterprises that apply strong password authentication (1);250 or more;100 3.2. Transport and storage (CNAE 49-53);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total;49,91 3.2. Transport and storage (CNAE 49-53);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 10 to 49;50,52 3.2. Transport and storage (CNAE 49-53);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 50 to 249;46,87 3.2. Transport and storage (CNAE 49-53);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);250 or more;51,37 3.2. Transport and storage (CNAE 49-53);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total;11,61 3.2. Transport and storage (CNAE 49-53);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 10 to 49;9,36 3.2. Transport and storage (CNAE 49-53);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 50 to 249;19,19 3.2. Transport and storage (CNAE 49-53);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);250 or more;29,3 3.2. Transport and storage (CNAE 49-53);L.1.D % of enterprises that use external data backup (1);Total;57,36 3.2. Transport and storage (CNAE 49-53);L.1.D % of enterprises that use external data backup (1);From 10 to 49;53,43 3.2. Transport and storage (CNAE 49-53);L.1.D % of enterprises that use external data backup (1);From 50 to 249;71,24 3.2. Transport and storage (CNAE 49-53);L.1.D % of enterprises that use external data backup (1);250 or more;84,15 3.2. Transport and storage (CNAE 49-53);L.1.E % of enterprises that use protocols to analyze security incidents (1);Total;39,96 3.2. Transport and storage (CNAE 49-53);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 10 to 49;36,97 3.2. Transport and storage (CNAE 49-53);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 50 to 249;48,75 3.2. Transport and storage (CNAE 49-53);L.1.E % of enterprises that use protocols to analyze security incidents (1);250 or more;71,49 3.3. Accommodation services (CNAE 55);L.1 % of enterprises with internal security systems;Total;92,65 3.3. Accommodation services (CNAE 55);L.1 % of enterprises with internal security systems;From 10 to 49;90,9 3.3. Accommodation services (CNAE 55);L.1 % of enterprises with internal security systems;From 50 to 249;98,49 3.3. Accommodation services (CNAE 55);L.1 % of enterprises with internal security systems;250 or more;100 3.3. Accommodation services (CNAE 55);L.1.A % of enterprises that apply strong password authentication (1);Total;95,76 3.3. Accommodation services (CNAE 55);L.1.A % of enterprises that apply strong password authentication (1);From 10 to 49;95,25 3.3. Accommodation services (CNAE 55);L.1.A % of enterprises that apply strong password authentication (1);From 50 to 249;97,61 3.3. Accommodation services (CNAE 55);L.1.A % of enterprises that apply strong password authentication (1);250 or more;96,12 3.3. Accommodation services (CNAE 55);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total;51,13 3.3. Accommodation services (CNAE 55);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 10 to 49;51,3 3.3. Accommodation services (CNAE 55);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 50 to 249;50,88 3.3. Accommodation services (CNAE 55);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);250 or more;48,78 3.3. Accommodation services (CNAE 55);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total;15,79 3.3. Accommodation services (CNAE 55);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 10 to 49;13,98 3.3. Accommodation services (CNAE 55);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 50 to 249;20,26 3.3. Accommodation services (CNAE 55);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);250 or more;30,25 3.3. Accommodation services (CNAE 55);L.1.D % of enterprises that use external data backup (1);Total;65,8 3.3. Accommodation services (CNAE 55);L.1.D % of enterprises that use external data backup (1);From 10 to 49;64,41 3.3. Accommodation services (CNAE 55);L.1.D % of enterprises that use external data backup (1);From 50 to 249;70,13 3.3. Accommodation services (CNAE 55);L.1.D % of enterprises that use external data backup (1);250 or more;70,73 3.3. Accommodation services (CNAE 55);L.1.E % of enterprises that use protocols to analyze security incidents (1);Total;49,18 3.3. Accommodation services (CNAE 55);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 10 to 49;46,7 3.3. Accommodation services (CNAE 55);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 50 to 249;56,23 3.3. Accommodation services (CNAE 55);L.1.E % of enterprises that use protocols to analyze security incidents (1);250 or more;63,03 3.4. Information and communications (CNAE 58-63);L.1 % of enterprises with internal security systems;Total;95,45 3.4. Information and communications (CNAE 58-63);L.1 % of enterprises with internal security systems;From 10 to 49;94,58 3.4. Information and communications (CNAE 58-63);L.1 % of enterprises with internal security systems;From 50 to 249;98,65 3.4. Information and communications (CNAE 58-63);L.1 % of enterprises with internal security systems;250 or more;96,97 3.4. Information and communications (CNAE 58-63);L.1.A % of enterprises that apply strong password authentication (1);Total;97,86 3.4. Information and communications (CNAE 58-63);L.1.A % of enterprises that apply strong password authentication (1);From 10 to 49;97,55 3.4. Information and communications (CNAE 58-63);L.1.A % of enterprises that apply strong password authentication (1);From 50 to 249;99,03 3.4. Information and communications (CNAE 58-63);L.1.A % of enterprises that apply strong password authentication (1);250 or more;97,95 3.4. Information and communications (CNAE 58-63);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total;53,36 3.4. Information and communications (CNAE 58-63);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 10 to 49;52,06 3.4. Information and communications (CNAE 58-63);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 50 to 249;53,75 3.4. Information and communications (CNAE 58-63);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);250 or more;72,84 3.4. Information and communications (CNAE 58-63);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total;26,76 3.4. Information and communications (CNAE 58-63);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 10 to 49;24,89 3.4. Information and communications (CNAE 58-63);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 50 to 249;31,06 3.4. Information and communications (CNAE 58-63);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);250 or more;39,13 3.4. Information and communications (CNAE 58-63);L.1.D % of enterprises that use external data backup (1);Total;83,74 3.4. Information and communications (CNAE 58-63);L.1.D % of enterprises that use external data backup (1);From 10 to 49;83,22 3.4. Information and communications (CNAE 58-63);L.1.D % of enterprises that use external data backup (1);From 50 to 249;83,96 3.4. Information and communications (CNAE 58-63);L.1.D % of enterprises that use external data backup (1);250 or more;91,17 3.4. Information and communications (CNAE 58-63);L.1.E % of enterprises that use protocols to analyze security incidents (1);Total;68,28 3.4. Information and communications (CNAE 58-63);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 10 to 49;64,27 3.4. Information and communications (CNAE 58-63);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 50 to 249;77,74 3.4. Information and communications (CNAE 58-63);L.1.E % of enterprises that use protocols to analyze security incidents (1);250 or more;93,89 3.5. Real estate activities (CNAE 68);L.1 % of enterprises with internal security systems;Total;90,4 3.5. Real estate activities (CNAE 68);L.1 % of enterprises with internal security systems;From 10 to 49;89,53 3.5. Real estate activities (CNAE 68);L.1 % of enterprises with internal security systems;From 50 to 249;98,81 3.5. Real estate activities (CNAE 68);L.1 % of enterprises with internal security systems;250 or more;100 3.5. Real estate activities (CNAE 68);L.1.A % of enterprises that apply strong password authentication (1);Total;98,45 3.5. Real estate activities (CNAE 68);L.1.A % of enterprises that apply strong password authentication (1);From 10 to 49;98,39 3.5. Real estate activities (CNAE 68);L.1.A % of enterprises that apply strong password authentication (1);From 50 to 249;98,79 3.5. Real estate activities (CNAE 68);L.1.A % of enterprises that apply strong password authentication (1);250 or more;100 3.5. Real estate activities (CNAE 68);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total;55,54 3.5. Real estate activities (CNAE 68);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 10 to 49;55,2 3.5. Real estate activities (CNAE 68);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 50 to 249;59,52 3.5. Real estate activities (CNAE 68);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);250 or more;54 3.5. Real estate activities (CNAE 68);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total;14,49 3.5. Real estate activities (CNAE 68);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 10 to 49;11,83 3.5. Real estate activities (CNAE 68);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 50 to 249;35,5 3.5. Real estate activities (CNAE 68);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);250 or more;51,89 3.5. Real estate activities (CNAE 68);L.1.D % of enterprises that use external data backup (1);Total;76,33 3.5. Real estate activities (CNAE 68);L.1.D % of enterprises that use external data backup (1);From 10 to 49;76,75 3.5. Real estate activities (CNAE 68);L.1.D % of enterprises that use external data backup (1);From 50 to 249;73,51 3.5. Real estate activities (CNAE 68);L.1.D % of enterprises that use external data backup (1);250 or more;67,92 3.5. Real estate activities (CNAE 68);L.1.E % of enterprises that use protocols to analyze security incidents (1);Total;50,03 3.5. Real estate activities (CNAE 68);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 10 to 49;48,07 3.5. Real estate activities (CNAE 68);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 50 to 249;61,04 3.5. Real estate activities (CNAE 68);L.1.E % of enterprises that use protocols to analyze security incidents (1);250 or more;100 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);L.1 % of enterprises with internal security systems;Total;94,18 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);L.1 % of enterprises with internal security systems;From 10 to 49;93,36 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);L.1 % of enterprises with internal security systems;From 50 to 249;98,27 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);L.1 % of enterprises with internal security systems;250 or more;98,26 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);L.1.A % of enterprises that apply strong password authentication (1);Total;97,34 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);L.1.A % of enterprises that apply strong password authentication (1);From 10 to 49;97 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);L.1.A % of enterprises that apply strong password authentication (1);From 50 to 249;98,76 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);L.1.A % of enterprises that apply strong password authentication (1);250 or more;100 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total;50,87 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 10 to 49;50,97 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 50 to 249;49,04 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);250 or more;57,21 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total;18,19 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 10 to 49;15,86 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 50 to 249;27,03 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);250 or more;40,3 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);L.1.D % of enterprises that use external data backup (1);Total;75,33 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);L.1.D % of enterprises that use external data backup (1);From 10 to 49;73,69 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);L.1.D % of enterprises that use external data backup (1);From 50 to 249;83,18 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);L.1.D % of enterprises that use external data backup (1);250 or more;82,66 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);L.1.E % of enterprises that use protocols to analyze security incidents (1);Total;56,54 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 10 to 49;53,75 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 50 to 249;68,26 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);L.1.E % of enterprises that use protocols to analyze security incidents (1);250 or more;77,23 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);L.1 % of enterprises with internal security systems;Total;79,93 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);L.1 % of enterprises with internal security systems;From 10 to 49;77 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);L.1 % of enterprises with internal security systems;From 50 to 249;87,13 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);L.1 % of enterprises with internal security systems;250 or more;96,29 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);L.1.A % of enterprises that apply strong password authentication (1);Total;92,98 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);L.1.A % of enterprises that apply strong password authentication (1);From 10 to 49;93,01 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);L.1.A % of enterprises that apply strong password authentication (1);From 50 to 249;91,99 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);L.1.A % of enterprises that apply strong password authentication (1);250 or more;95,33 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total;51,86 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 10 to 49;52,11 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 50 to 249;49,35 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);250 or more;56,08 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total;11,14 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 10 to 49;9,2 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 50 to 249;12,19 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);250 or more;28,31 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);L.1.D % of enterprises that use external data backup (1);Total;55,85 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);L.1.D % of enterprises that use external data backup (1);From 10 to 49;52,47 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);L.1.D % of enterprises that use external data backup (1);From 50 to 249;62,26 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);L.1.D % of enterprises that use external data backup (1);250 or more;73,49 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);L.1.E % of enterprises that use protocols to analyze security incidents (1);Total;35,84 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 10 to 49;31,07 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 50 to 249;44,5 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);L.1.E % of enterprises that use protocols to analyze security incidents (1);250 or more;61,67 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);L.1 % of enterprises with internal security systems;Total;98,09 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);L.1 % of enterprises with internal security systems;From 10 to 49;97,73 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);L.1 % of enterprises with internal security systems;From 50 to 249;100 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);L.1 % of enterprises with internal security systems;250 or more;95,88 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);L.1.A % of enterprises that apply strong password authentication (1);Total;98,5 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);L.1.A % of enterprises that apply strong password authentication (1);From 10 to 49;98,51 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);L.1.A % of enterprises that apply strong password authentication (1);From 50 to 249;98,54 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);L.1.A % of enterprises that apply strong password authentication (1);250 or more;98,02 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total;54,82 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 10 to 49;52,99 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);From 50 to 249;57,5 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);L.1.B % of enterprises that use user identification and authentication with hardware elements (1);250 or more;72,37 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total;30,66 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 10 to 49;28,87 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);From 50 to 249;34,96 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);L.1.C % of enterprises that use user identification and authentication with biometric elements (1);250 or more;40,8 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);L.1.D % of enterprises that use external data backup (1);Total;83,48 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);L.1.D % of enterprises that use external data backup (1);From 10 to 49;82,89 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);L.1.D % of enterprises that use external data backup (1);From 50 to 249;84,68 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);L.1.D % of enterprises that use external data backup (1);250 or more;87,83 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);L.1.E % of enterprises that use protocols to analyze security incidents (1);Total;67,19 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 10 to 49;62,82 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);L.1.E % of enterprises that use protocols to analyze security incidents (1);From 50 to 249;77,82 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);L.1.E % of enterprises that use protocols to analyze security incidents (1);250 or more;91,11