Economic activity cluster;Main variables;Total Total Enterprises;H.1 % of enterprises that apply some ICT security measure;56.96 Total Enterprises;H.1.A % of enterprises with strong password authentication (1);37.73 Total Enterprises;H.1.B % of enterprises that maintain software updated (1);51.22 Total Enterprises;H.1.C % of enterprises with biometric authentication (1);8.33 Total Enterprises;H.1.D % of enterprises with encryption techniques (1);14.76 Total Enterprises;H.1.E % of enterprises with data backup in a separate location (1);42.40 Total Enterprises;H.1.F % of enterprises with control of network access (1);26.15 Total Enterprises;H.1.G % of enterprises with a Virtual Private Network (1);7.71 Total Enterprises;H.1.H % of enterprises that maintain log files to analyze security incidents (1);11.29 Total Enterprises;H.1.I % of enterprises with an ICT risk assessment (1);7.68 Total Enterprises;H.1.J % of enterprises with an ICT security test (1);8.75 Total Enterprises;H.2.A % of enterprises with voluntary ICT security training;17.22 Total Enterprises;H.2.B % of enterprises with obligations training on ICT security;6.40 Total Enterprises;H.2.C % of enterprises with ICT security obligations by contract;5.64 Total Enterprises;H.3.A % of enterprises whose ICT security is handled by the employees themselves;26.66 Total Enterprises;H.3.B % of enterprises whose ICT security is handled by external providers;27.57 Total Enterprises;H.4 % of enterprises with ICT security documentation;10.32 Total Enterprises;H.5.A % of enterprises with ICT security documentation: Management of ICT access rights (2);78.46 Total Enterprises;H.5.B % of enterprises with ICT security documentation: Storage, protection, access or processing of data (2);86.52 Total Enterprises;H.5.C % of enterprises with ICT security documentation: Procedures to prevent or handle ICT incidents (2);55.61 Total Enterprises;H.5.D % of enterprises with ICT security documentation: Responsibilities, rights and duties of employees in the ICT field (2);76.77 Total Enterprises;H.5.E % of enterprises with ICT security documentation: Training of employees in the secure use of ICT (2);50.23 Total Enterprises;H.6.A % of enterprises with ICT security documentation: within the last 12 months (2);74.26 Total Enterprises;H.6.B % of enterprises with ICT security documentation: between 12 and 24 months (2);13.21 Total Enterprises;H.6.C % of enterprises with ICT security documentation: more than 24 months ago (2);12.53 Total Enterprises;H.7.A % of enterprises by type of incident in 2018: ICT services unavailable;1.62 Total Enterprises;H.7.B % of enterprises by type of incident in 2018: Destruction or corruption of data;1.93 Total Enterprises;H.7.C % of enterprises by type of incident in 2018: Disclosure of confidential data;0.28 Total Enterprises;H.8 % of enterprises that have insurance against ICT security incidents;5.73 Industry;H.1 % of enterprises that apply some ICT security measure;53.77 Industry;H.1.A % of enterprises with strong password authentication (1);33.15 Industry;H.1.B % of enterprises that maintain software updated (1);47.97 Industry;H.1.C % of enterprises with biometric authentication (1);5.59 Industry;H.1.D % of enterprises with encryption techniques (1);11.71 Industry;H.1.E % of enterprises with data backup in a separate location (1);36.84 Industry;H.1.F % of enterprises with control of network access (1);22.15 Industry;H.1.G % of enterprises with a Virtual Private Network (1);4.68 Industry;H.1.H % of enterprises that maintain log files to analyze security incidents (1);6.82 Industry;H.1.I % of enterprises with an ICT risk assessment (1);4.49 Industry;H.1.J % of enterprises with an ICT security test (1);5.03 Industry;H.2.A % of enterprises with voluntary ICT security training;12.41 Industry;H.2.B % of enterprises with obligations training on ICT security;5.65 Industry;H.2.C % of enterprises with ICT security obligations by contract;4.47 Industry;H.3.A % of enterprises whose ICT security is handled by the employees themselves;22.14 Industry;H.3.B % of enterprises whose ICT security is handled by external providers;29.54 Industry;H.4 % of enterprises with ICT security documentation;7.17 Industry;H.5.A % of enterprises with ICT security documentation: Management of ICT access rights (2);71.77 Industry;H.5.B % of enterprises with ICT security documentation: Storage, protection, access or processing of data (2);83.44 Industry;H.5.C % of enterprises with ICT security documentation: Procedures to prevent or handle ICT incidents (2);53.77 Industry;H.5.D % of enterprises with ICT security documentation: Responsibilities, rights and duties of employees in the ICT field (2);73.87 Industry;H.5.E % of enterprises with ICT security documentation: Training of employees in the secure use of ICT (2);52.50 Industry;H.6.A % of enterprises with ICT security documentation: within the last 12 months (2);81.24 Industry;H.6.B % of enterprises with ICT security documentation: between 12 and 24 months (2);9.84 Industry;H.6.C % of enterprises with ICT security documentation: more than 24 months ago (2);8.92 Industry;H.7.A % of enterprises by type of incident in 2018: ICT services unavailable;0.95 Industry;H.7.B % of enterprises by type of incident in 2018: Destruction or corruption of data;1.97 Industry;H.7.C % of enterprises by type of incident in 2018: Disclosure of confidential data;0.53 Industry;H.8 % of enterprises that have insurance against ICT security incidents;3.64 Construction;H.1 % of enterprises that apply some ICT security measure;44.57 Construction;H.1.A % of enterprises with strong password authentication (1);29.63 Construction;H.1.B % of enterprises that maintain software updated (1);36.53 Construction;H.1.C % of enterprises with biometric authentication (1);7.18 Construction;H.1.D % of enterprises with encryption techniques (1);7.60 Construction;H.1.E % of enterprises with data backup in a separate location (1);28.81 Construction;H.1.F % of enterprises with control of network access (1);14.18 Construction;H.1.G % of enterprises with a Virtual Private Network (1);5.02 Construction;H.1.H % of enterprises that maintain log files to analyze security incidents (1);5.97 Construction;H.1.I % of enterprises with an ICT risk assessment (1);4.90 Construction;H.1.J % of enterprises with an ICT security test (1);6.40 Construction;H.2.A % of enterprises with voluntary ICT security training;9.33 Construction;H.2.B % of enterprises with obligations training on ICT security;6.08 Construction;H.2.C % of enterprises with ICT security obligations by contract;5.87 Construction;H.3.A % of enterprises whose ICT security is handled by the employees themselves;17.33 Construction;H.3.B % of enterprises whose ICT security is handled by external providers;22.14 Construction;H.4 % of enterprises with ICT security documentation;6.58 Construction;H.5.A % of enterprises with ICT security documentation: Management of ICT access rights (2);69.94 Construction;H.5.B % of enterprises with ICT security documentation: Storage, protection, access or processing of data (2);77.73 Construction;H.5.C % of enterprises with ICT security documentation: Procedures to prevent or handle ICT incidents (2);44.76 Construction;H.5.D % of enterprises with ICT security documentation: Responsibilities, rights and duties of employees in the ICT field (2);63.76 Construction;H.5.E % of enterprises with ICT security documentation: Training of employees in the secure use of ICT (2);40.03 Construction;H.6.A % of enterprises with ICT security documentation: within the last 12 months (2);60.61 Construction;H.6.B % of enterprises with ICT security documentation: between 12 and 24 months (2);7.91 Construction;H.6.C % of enterprises with ICT security documentation: more than 24 months ago (2);31.49 Construction;H.7.A % of enterprises by type of incident in 2018: ICT services unavailable;1.56 Construction;H.7.B % of enterprises by type of incident in 2018: Destruction or corruption of data;1.67 Construction;H.7.C % of enterprises by type of incident in 2018: Disclosure of confidential data;0.12 Construction;H.8 % of enterprises that have insurance against ICT security incidents;2.32 Services;H.1 % of enterprises that apply some ICT security measure;60.11 Services;H.1.A % of enterprises with strong password authentication (1);40.05 Services;H.1.B % of enterprises that maintain software updated (1);54.90 Services;H.1.C % of enterprises with biometric authentication (1);8.88 Services;H.1.D % of enterprises with encryption techniques (1);16.70 Services;H.1.E % of enterprises with data backup in a separate location (1);46.06 Services;H.1.F % of enterprises with control of network access (1);29.28 Services;H.1.G % of enterprises with a Virtual Private Network (1);8.63 Services;H.1.H % of enterprises that maintain log files to analyze security incidents (1);12.96 Services;H.1.I % of enterprises with an ICT risk assessment (1);8.64 Services;H.1.J % of enterprises with an ICT security test (1);9.67 Services;H.2.A % of enterprises with voluntary ICT security training;19.51 Services;H.2.B % of enterprises with obligations training on ICT security;6.55 Services;H.2.C % of enterprises with ICT security obligations by contract;5.71 Services;H.3.A % of enterprises whose ICT security is handled by the employees themselves;29.25 Services;H.3.B % of enterprises whose ICT security is handled by external providers;28.61 Services;H.4 % of enterprises with ICT security documentation;11.50 Services;H.5.A % of enterprises with ICT security documentation: Management of ICT access rights (2);79.99 Services;H.5.B % of enterprises with ICT security documentation: Storage, protection, access or processing of data (2);87.86 Services;H.5.C % of enterprises with ICT security documentation: Procedures to prevent or handle ICT incidents (2);57.14 Services;H.5.D % of enterprises with ICT security documentation: Responsibilities, rights and duties of employees in the ICT field (2);78.65 Services;H.5.E % of enterprises with ICT security documentation: Training of employees in the secure use of ICT (2);51.41 Services;H.6.A % of enterprises with ICT security documentation: within the last 12 months (2);75.58 Services;H.6.B % of enterprises with ICT security documentation: between 12 and 24 months (2);14.11 Services;H.6.C % of enterprises with ICT security documentation: more than 24 months ago (2);10.30 Services;H.7.A % of enterprises by type of incident in 2018: ICT services unavailable;1.71 Services;H.7.B % of enterprises by type of incident in 2018: Destruction or corruption of data;1.99 Services;H.7.C % of enterprises by type of incident in 2018: Disclosure of confidential data;0.29 Services;H.8 % of enterprises that have insurance against ICT security incidents;6.72