Activity grouping (except CNAE 56, 64-66 and 95.1);Main variables;Size of the enterprise;Total Total Enterprises;B.3 % of enterprises that apply some ICT security measure;Total;96,34 Total Enterprises;B.3 % of enterprises that apply some ICT security measure;From 10 to 49;95,91 Total Enterprises;B.3 % of enterprises that apply some ICT security measure;From 50 to 249;98,2 Total Enterprises;B.3 % of enterprises that apply some ICT security measure;250 or more;99,24 Total Enterprises;B.3.A % of enterprises with strong password authentication (1);Total;75,71 Total Enterprises;B.3.A % of enterprises with strong password authentication (1);From 10 to 49;73,63 Total Enterprises;B.3.A % of enterprises with strong password authentication (1);From 50 to 249;84,02 Total Enterprises;B.3.A % of enterprises with strong password authentication (1);250 or more;91,74 Total Enterprises;B.3.B % of enterprises that maintain software updated (1);Total;96,55 Total Enterprises;B.3.B % of enterprises that maintain software updated (1);From 10 to 49;96,36 Total Enterprises;B.3.B % of enterprises that maintain software updated (1);From 50 to 249;97,25 Total Enterprises;B.3.B % of enterprises that maintain software updated (1);250 or more;98,32 Total Enterprises;B.3.C % of enterprises with biometric authentication (1);Total;24,88 Total Enterprises;B.3.C % of enterprises with biometric authentication (1);From 10 to 49;22,86 Total Enterprises;B.3.C % of enterprises with biometric authentication (1);From 50 to 249;33,22 Total Enterprises;B.3.C % of enterprises with biometric authentication (1);250 or more;39,19 Total Enterprises;B.3.D % of enterprises with encryption techniques (1);Total;42,81 Total Enterprises;B.3.D % of enterprises with encryption techniques (1);From 10 to 49;39,67 Total Enterprises;B.3.D % of enterprises with encryption techniques (1);From 50 to 249;54,65 Total Enterprises;B.3.D % of enterprises with encryption techniques (1);250 or more;71,31 Total Enterprises;B.3.E % of enterprises with data backup in a separate location (1);Total;91,13 Total Enterprises;B.3.E % of enterprises with data backup in a separate location (1);From 10 to 49;90,34 Total Enterprises;B.3.E % of enterprises with data backup in a separate location (1);From 50 to 249;94,48 Total Enterprises;B.3.E % of enterprises with data backup in a separate location (1);250 or more;96,3 Total Enterprises;B.3.F % of enterprises with control of network access (1);Total;81,22 Total Enterprises;B.3.F % of enterprises with control of network access (1);From 10 to 49;79,35 Total Enterprises;B.3.F % of enterprises with control of network access (1);From 50 to 249;88,87 Total Enterprises;B.3.F % of enterprises with control of network access (1);250 or more;95,03 Total Enterprises;B.3.G % of enterprises with a Virtual Private Network (1);Total;48,42 Total Enterprises;B.3.G % of enterprises with a Virtual Private Network (1);From 10 to 49;42,92 Total Enterprises;B.3.G % of enterprises with a Virtual Private Network (1);From 50 to 249;71,06 Total Enterprises;B.3.G % of enterprises with a Virtual Private Network (1);250 or more;87,88 Total Enterprises;B.3.H % of enterprises that maintain log files to analyze security incidents (1);Total;52,47 Total Enterprises;B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;48,71 Total Enterprises;B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;67,36 Total Enterprises;B.3.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;82,61 Total Enterprises;B.3.J % of enterprises with an ICT risk assessment (1);Total;38,85 Total Enterprises;B.3.J % of enterprises with an ICT risk assessment (1);From 10 to 49;35,2 Total Enterprises;B.3.J % of enterprises with an ICT risk assessment (1);From 50 to 249;52,57 Total Enterprises;B.3.J % of enterprises with an ICT risk assessment (1);250 or more;71,7 Total Enterprises;B.3.I % of enterprises with an ICT security test (1);Total;42,98 Total Enterprises;B.3.I % of enterprises with an ICT security test (1);From 10 to 49;39,43 Total Enterprises;B.3.I % of enterprises with an ICT security test (1);From 50 to 249;56,68 Total Enterprises;B.3.I % of enterprises with an ICT security test (1);250 or more;73,54 1. Total Industry (CNAE 10-39);B.3 % of enterprises that apply some ICT security measure;Total;95,55 1. Total Industry (CNAE 10-39);B.3 % of enterprises that apply some ICT security measure;From 10 to 49;94,75 1. Total Industry (CNAE 10-39);B.3 % of enterprises that apply some ICT security measure;From 50 to 249;98,61 1. Total Industry (CNAE 10-39);B.3 % of enterprises that apply some ICT security measure;250 or more;99,87 1. Total Industry (CNAE 10-39);B.3.A % of enterprises with strong password authentication (1);Total;74,16 1. Total Industry (CNAE 10-39);B.3.A % of enterprises with strong password authentication (1);From 10 to 49;70,76 1. Total Industry (CNAE 10-39);B.3.A % of enterprises with strong password authentication (1);From 50 to 249;86 1. Total Industry (CNAE 10-39);B.3.A % of enterprises with strong password authentication (1);250 or more;94,46 1. Total Industry (CNAE 10-39);B.3.B % of enterprises that maintain software updated (1);Total;95,81 1. Total Industry (CNAE 10-39);B.3.B % of enterprises that maintain software updated (1);From 10 to 49;95,27 1. Total Industry (CNAE 10-39);B.3.B % of enterprises that maintain software updated (1);From 50 to 249;97,83 1. Total Industry (CNAE 10-39);B.3.B % of enterprises that maintain software updated (1);250 or more;98,25 1. Total Industry (CNAE 10-39);B.3.C % of enterprises with biometric authentication (1);Total;28,8 1. Total Industry (CNAE 10-39);B.3.C % of enterprises with biometric authentication (1);From 10 to 49;26,25 1. Total Industry (CNAE 10-39);B.3.C % of enterprises with biometric authentication (1);From 50 to 249;38,64 1. Total Industry (CNAE 10-39);B.3.C % of enterprises with biometric authentication (1);250 or more;39,55 1. Total Industry (CNAE 10-39);B.3.D % of enterprises with encryption techniques (1);Total;38,82 1. Total Industry (CNAE 10-39);B.3.D % of enterprises with encryption techniques (1);From 10 to 49;33,76 1. Total Industry (CNAE 10-39);B.3.D % of enterprises with encryption techniques (1);From 50 to 249;55,07 1. Total Industry (CNAE 10-39);B.3.D % of enterprises with encryption techniques (1);250 or more;75,58 1. Total Industry (CNAE 10-39);B.3.E % of enterprises with data backup in a separate location (1);Total;90,07 1. Total Industry (CNAE 10-39);B.3.E % of enterprises with data backup in a separate location (1);From 10 to 49;88,83 1. Total Industry (CNAE 10-39);B.3.E % of enterprises with data backup in a separate location (1);From 50 to 249;94,67 1. Total Industry (CNAE 10-39);B.3.E % of enterprises with data backup in a separate location (1);250 or more;96,26 1. Total Industry (CNAE 10-39);B.3.F % of enterprises with control of network access (1);Total;79,03 1. Total Industry (CNAE 10-39);B.3.F % of enterprises with control of network access (1);From 10 to 49;75,98 1. Total Industry (CNAE 10-39);B.3.F % of enterprises with control of network access (1);From 50 to 249;90,17 1. Total Industry (CNAE 10-39);B.3.F % of enterprises with control of network access (1);250 or more;94,87 1. Total Industry (CNAE 10-39);B.3.G % of enterprises with a Virtual Private Network (1);Total;47,53 1. Total Industry (CNAE 10-39);B.3.G % of enterprises with a Virtual Private Network (1);From 10 to 49;39,18 1. Total Industry (CNAE 10-39);B.3.G % of enterprises with a Virtual Private Network (1);From 50 to 249;77,41 1. Total Industry (CNAE 10-39);B.3.G % of enterprises with a Virtual Private Network (1);250 or more;93,59 1. Total Industry (CNAE 10-39);B.3.H % of enterprises that maintain log files to analyze security incidents (1);Total;48,43 1. Total Industry (CNAE 10-39);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;42,41 1. Total Industry (CNAE 10-39);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;68,97 1. Total Industry (CNAE 10-39);B.3.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;86,6 1. Total Industry (CNAE 10-39);B.3.J % of enterprises with an ICT risk assessment (1);Total;34,62 1. Total Industry (CNAE 10-39);B.3.J % of enterprises with an ICT risk assessment (1);From 10 to 49;28,99 1. Total Industry (CNAE 10-39);B.3.J % of enterprises with an ICT risk assessment (1);From 50 to 249;52,85 1. Total Industry (CNAE 10-39);B.3.J % of enterprises with an ICT risk assessment (1);250 or more;75,14 1. Total Industry (CNAE 10-39);B.3.I % of enterprises with an ICT security test (1);Total;40,14 1. Total Industry (CNAE 10-39);B.3.I % of enterprises with an ICT security test (1);From 10 to 49;34,97 1. Total Industry (CNAE 10-39);B.3.I % of enterprises with an ICT security test (1);From 50 to 249;56,53 1. Total Industry (CNAE 10-39);B.3.I % of enterprises with an ICT security test (1);250 or more;78,94 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3 % of enterprises that apply some ICT security measure;Total;94,37 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3 % of enterprises that apply some ICT security measure;From 10 to 49;93,72 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3 % of enterprises that apply some ICT security measure;From 50 to 249;97,29 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3 % of enterprises that apply some ICT security measure;250 or more;99,55 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.A % of enterprises with strong password authentication (1);Total;67,95 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.A % of enterprises with strong password authentication (1);From 10 to 49;65,08 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.A % of enterprises with strong password authentication (1);From 50 to 249;79,92 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.A % of enterprises with strong password authentication (1);250 or more;91,96 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.B % of enterprises that maintain software updated (1);Total;94,18 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.B % of enterprises that maintain software updated (1);From 10 to 49;93,86 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.B % of enterprises that maintain software updated (1);From 50 to 249;95,72 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.B % of enterprises that maintain software updated (1);250 or more;95,91 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.C % of enterprises with biometric authentication (1);Total;29,25 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.C % of enterprises with biometric authentication (1);From 10 to 49;27,59 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.C % of enterprises with biometric authentication (1);From 50 to 249;37,41 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.C % of enterprises with biometric authentication (1);250 or more;36,56 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.D % of enterprises with encryption techniques (1);Total;34,58 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.D % of enterprises with encryption techniques (1);From 10 to 49;30,46 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.D % of enterprises with encryption techniques (1);From 50 to 249;51,84 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.D % of enterprises with encryption techniques (1);250 or more;68,94 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.E % of enterprises with data backup in a separate location (1);Total;87,89 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.E % of enterprises with data backup in a separate location (1);From 10 to 49;86,75 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.E % of enterprises with data backup in a separate location (1);From 50 to 249;93,05 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.E % of enterprises with data backup in a separate location (1);250 or more;95,17 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.F % of enterprises with control of network access (1);Total;75,95 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.F % of enterprises with control of network access (1);From 10 to 49;73,74 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.F % of enterprises with control of network access (1);From 50 to 249;85,71 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.F % of enterprises with control of network access (1);250 or more;91,76 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.G % of enterprises with a Virtual Private Network (1);Total;42,25 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.G % of enterprises with a Virtual Private Network (1);From 10 to 49;36,22 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.G % of enterprises with a Virtual Private Network (1);From 50 to 249;68,07 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.G % of enterprises with a Virtual Private Network (1);250 or more;89,46 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.H % of enterprises that maintain log files to analyze security incidents (1);Total;41,01 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;35,88 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;62,89 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;81,46 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.J % of enterprises with an ICT risk assessment (1);Total;28,33 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.J % of enterprises with an ICT risk assessment (1);From 10 to 49;23,37 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.J % of enterprises with an ICT risk assessment (1);From 50 to 249;49,65 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.J % of enterprises with an ICT risk assessment (1);250 or more;66,79 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.I % of enterprises with an ICT security test (1);Total;34,26 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.I % of enterprises with an ICT security test (1);From 10 to 49;29,41 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.I % of enterprises with an ICT security test (1);From 50 to 249;54,81 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);B.3.I % of enterprises with an ICT security test (1);250 or more;73,4 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3 % of enterprises that apply some ICT security measure;Total;98,66 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3 % of enterprises that apply some ICT security measure;From 10 to 49;98,32 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3 % of enterprises that apply some ICT security measure;From 50 to 249;99,53 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3 % of enterprises that apply some ICT security measure;250 or more;100 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.A % of enterprises with strong password authentication (1);Total;79,9 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.A % of enterprises with strong password authentication (1);From 10 to 49;75,32 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.A % of enterprises with strong password authentication (1);From 50 to 249;92 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.A % of enterprises with strong password authentication (1);250 or more;95,8 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.B % of enterprises that maintain software updated (1);Total;96,13 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.B % of enterprises that maintain software updated (1);From 10 to 49;94,95 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.B % of enterprises that maintain software updated (1);From 50 to 249;99,44 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.B % of enterprises that maintain software updated (1);250 or more;99,19 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.C % of enterprises with biometric authentication (1);Total;29,46 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.C % of enterprises with biometric authentication (1);From 10 to 49;24,44 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.C % of enterprises with biometric authentication (1);From 50 to 249;42,49 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.C % of enterprises with biometric authentication (1);250 or more;47,94 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.D % of enterprises with encryption techniques (1);Total;40,93 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.D % of enterprises with encryption techniques (1);From 10 to 49;33,12 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.D % of enterprises with encryption techniques (1);From 50 to 249;59,01 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.D % of enterprises with encryption techniques (1);250 or more;79,11 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.E % of enterprises with data backup in a separate location (1);Total;91,35 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.E % of enterprises with data backup in a separate location (1);From 10 to 49;89,98 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.E % of enterprises with data backup in a separate location (1);From 50 to 249;95,14 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.E % of enterprises with data backup in a separate location (1);250 or more;95,36 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.F % of enterprises with control of network access (1);Total;80,53 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.F % of enterprises with control of network access (1);From 10 to 49;75,14 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.F % of enterprises with control of network access (1);From 50 to 249;95,17 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.F % of enterprises with control of network access (1);250 or more;97,3 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.G % of enterprises with a Virtual Private Network (1);Total;55,68 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.G % of enterprises with a Virtual Private Network (1);From 10 to 49;45,45 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.G % of enterprises with a Virtual Private Network (1);From 50 to 249;81,35 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.G % of enterprises with a Virtual Private Network (1);250 or more;96,99 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.H % of enterprises that maintain log files to analyze security incidents (1);Total;53,95 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;43,95 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;79,48 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;92,44 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.J % of enterprises with an ICT risk assessment (1);Total;39,24 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.J % of enterprises with an ICT risk assessment (1);From 10 to 49;30,84 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.J % of enterprises with an ICT risk assessment (1);From 50 to 249;58,72 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.J % of enterprises with an ICT risk assessment (1);250 or more;80,12 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.I % of enterprises with an ICT security test (1);Total;40,63 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.I % of enterprises with an ICT security test (1);From 10 to 49;32,18 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.I % of enterprises with an ICT security test (1);From 50 to 249;59,11 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);B.3.I % of enterprises with an ICT security test (1);250 or more;86,55 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3 % of enterprises that apply some ICT security measure;Total;94,27 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3 % of enterprises that apply some ICT security measure;From 10 to 49;93,39 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3 % of enterprises that apply some ICT security measure;From 50 to 249;99,18 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3 % of enterprises that apply some ICT security measure;250 or more;100 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.A % of enterprises with strong password authentication (1);Total;78,64 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.A % of enterprises with strong password authentication (1);From 10 to 49;76,91 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.A % of enterprises with strong password authentication (1);From 50 to 249;86,51 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.A % of enterprises with strong password authentication (1);250 or more;97,69 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.B % of enterprises that maintain software updated (1);Total;96,92 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.B % of enterprises that maintain software updated (1);From 10 to 49;96,95 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.B % of enterprises that maintain software updated (1);From 50 to 249;96,32 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.B % of enterprises that maintain software updated (1);250 or more;100 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.C % of enterprises with biometric authentication (1);Total;35,08 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.C % of enterprises with biometric authentication (1);From 10 to 49;35,97 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.C % of enterprises with biometric authentication (1);From 50 to 249;29,58 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.C % of enterprises with biometric authentication (1);250 or more;35,74 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.D % of enterprises with encryption techniques (1);Total;44,4 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.D % of enterprises with encryption techniques (1);From 10 to 49;42,91 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.D % of enterprises with encryption techniques (1);From 50 to 249;50,35 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.D % of enterprises with encryption techniques (1);250 or more;66,42 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.E % of enterprises with data backup in a separate location (1);Total;92,41 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.E % of enterprises with data backup in a separate location (1);From 10 to 49;91,93 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.E % of enterprises with data backup in a separate location (1);From 50 to 249;94,6 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.E % of enterprises with data backup in a separate location (1);250 or more;97,64 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.F % of enterprises with control of network access (1);Total;81,34 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.F % of enterprises with control of network access (1);From 10 to 49;79,89 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.F % of enterprises with control of network access (1);From 50 to 249;88,48 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.F % of enterprises with control of network access (1);250 or more;93,27 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.G % of enterprises with a Virtual Private Network (1);Total;47,93 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.G % of enterprises with a Virtual Private Network (1);From 10 to 49;41,05 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.G % of enterprises with a Virtual Private Network (1);From 50 to 249;83,06 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.G % of enterprises with a Virtual Private Network (1);250 or more;95,74 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.H % of enterprises that maintain log files to analyze security incidents (1);Total;53,28 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;50,6 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;65,38 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;83,27 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.J % of enterprises with an ICT risk assessment (1);Total;42,4 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.J % of enterprises with an ICT risk assessment (1);From 10 to 49;39,92 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.J % of enterprises with an ICT risk assessment (1);From 50 to 249;52,84 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.J % of enterprises with an ICT risk assessment (1);250 or more;75,69 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.I % of enterprises with an ICT security test (1);Total;48,05 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.I % of enterprises with an ICT security test (1);From 10 to 49;46,42 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.I % of enterprises with an ICT security test (1);From 50 to 249;54,62 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);B.3.I % of enterprises with an ICT security test (1);250 or more;72,03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3 % of enterprises that apply some ICT security measure;Total;95,56 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3 % of enterprises that apply some ICT security measure;From 10 to 49;94,48 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3 % of enterprises that apply some ICT security measure;From 50 to 249;99,12 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3 % of enterprises that apply some ICT security measure;250 or more;100 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.A % of enterprises with strong password authentication (1);Total;75,94 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.A % of enterprises with strong password authentication (1);From 10 to 49;71,78 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.A % of enterprises with strong password authentication (1);From 50 to 249;88,25 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.A % of enterprises with strong password authentication (1);250 or more;95,8 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.B % of enterprises that maintain software updated (1);Total;97,52 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.B % of enterprises that maintain software updated (1);From 10 to 49;96,83 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.B % of enterprises that maintain software updated (1);From 50 to 249;99,91 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.B % of enterprises that maintain software updated (1);250 or more;99,2 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.C % of enterprises with biometric authentication (1);Total;23,97 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.C % of enterprises with biometric authentication (1);From 10 to 49;18,32 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.C % of enterprises with biometric authentication (1);From 50 to 249;43,35 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.C % of enterprises with biometric authentication (1);250 or more;38,38 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.D % of enterprises with encryption techniques (1);Total;39,3 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.D % of enterprises with encryption techniques (1);From 10 to 49;32,07 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.D % of enterprises with encryption techniques (1);From 50 to 249;58,66 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.D % of enterprises with encryption techniques (1);250 or more;83,68 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.E % of enterprises with data backup in a separate location (1);Total;91,12 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.E % of enterprises with data backup in a separate location (1);From 10 to 49;89,55 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.E % of enterprises with data backup in a separate location (1);From 50 to 249;96 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.E % of enterprises with data backup in a separate location (1);250 or more;97,55 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.F % of enterprises with control of network access (1);Total;80,19 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.F % of enterprises with control of network access (1);From 10 to 49;76,11 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.F % of enterprises with control of network access (1);From 50 to 249;93,12 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.F % of enterprises with control of network access (1);250 or more;95,81 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.G % of enterprises with a Virtual Private Network (1);Total;49,23 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.G % of enterprises with a Virtual Private Network (1);From 10 to 49;38,52 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.G % of enterprises with a Virtual Private Network (1);From 50 to 249;82,04 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.G % of enterprises with a Virtual Private Network (1);250 or more;95,08 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.H % of enterprises that maintain log files to analyze security incidents (1);Total;50,04 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;43,04 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;69,81 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;87,91 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.J % of enterprises with an ICT risk assessment (1);Total;35,24 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.J % of enterprises with an ICT risk assessment (1);From 10 to 49;28,41 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.J % of enterprises with an ICT risk assessment (1);From 50 to 249;52,66 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.J % of enterprises with an ICT risk assessment (1);250 or more;81,14 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.I % of enterprises with an ICT security test (1);Total;41,77 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.I % of enterprises with an ICT security test (1);From 10 to 49;35,64 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.I % of enterprises with an ICT security test (1);From 50 to 249;57,37 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);B.3.I % of enterprises with an ICT security test (1);250 or more;83,19 1.5. Energy and water (CNAE 35-39);B.3 % of enterprises that apply some ICT security measure;Total;99,39 1.5. Energy and water (CNAE 35-39);B.3 % of enterprises that apply some ICT security measure;From 10 to 49;99,39 1.5. Energy and water (CNAE 35-39);B.3 % of enterprises that apply some ICT security measure;From 50 to 249;99,2 1.5. Energy and water (CNAE 35-39);B.3 % of enterprises that apply some ICT security measure;250 or more;100 1.5. Energy and water (CNAE 35-39);B.3.A % of enterprises with strong password authentication (1);Total;79,04 1.5. Energy and water (CNAE 35-39);B.3.A % of enterprises with strong password authentication (1);From 10 to 49;75,25 1.5. Energy and water (CNAE 35-39);B.3.A % of enterprises with strong password authentication (1);From 50 to 249;87,66 1.5. Energy and water (CNAE 35-39);B.3.A % of enterprises with strong password authentication (1);250 or more;92,55 1.5. Energy and water (CNAE 35-39);B.3.B % of enterprises that maintain software updated (1);Total;95,5 1.5. Energy and water (CNAE 35-39);B.3.B % of enterprises that maintain software updated (1);From 10 to 49;94,38 1.5. Energy and water (CNAE 35-39);B.3.B % of enterprises that maintain software updated (1);From 50 to 249;98,27 1.5. Energy and water (CNAE 35-39);B.3.B % of enterprises that maintain software updated (1);250 or more;98,85 1.5. Energy and water (CNAE 35-39);B.3.C % of enterprises with biometric authentication (1);Total;24,35 1.5. Energy and water (CNAE 35-39);B.3.C % of enterprises with biometric authentication (1);From 10 to 49;20,14 1.5. Energy and water (CNAE 35-39);B.3.C % of enterprises with biometric authentication (1);From 50 to 249;34,58 1.5. Energy and water (CNAE 35-39);B.3.C % of enterprises with biometric authentication (1);250 or more;37,37 1.5. Energy and water (CNAE 35-39);B.3.D % of enterprises with encryption techniques (1);Total;42,22 1.5. Energy and water (CNAE 35-39);B.3.D % of enterprises with encryption techniques (1);From 10 to 49;35,35 1.5. Energy and water (CNAE 35-39);B.3.D % of enterprises with encryption techniques (1);From 50 to 249;55,23 1.5. Energy and water (CNAE 35-39);B.3.D % of enterprises with encryption techniques (1);250 or more;74,95 1.5. Energy and water (CNAE 35-39);B.3.E % of enterprises with data backup in a separate location (1);Total;89,77 1.5. Energy and water (CNAE 35-39);B.3.E % of enterprises with data backup in a separate location (1);From 10 to 49;87,31 1.5. Energy and water (CNAE 35-39);B.3.E % of enterprises with data backup in a separate location (1);From 50 to 249;95,99 1.5. Energy and water (CNAE 35-39);B.3.E % of enterprises with data backup in a separate location (1);250 or more;96,57 1.5. Energy and water (CNAE 35-39);B.3.F % of enterprises with control of network access (1);Total;83,73 1.5. Energy and water (CNAE 35-39);B.3.F % of enterprises with control of network access (1);From 10 to 49;80,87 1.5. Energy and water (CNAE 35-39);B.3.F % of enterprises with control of network access (1);From 50 to 249;89,09 1.5. Energy and water (CNAE 35-39);B.3.F % of enterprises with control of network access (1);250 or more;97,56 1.5. Energy and water (CNAE 35-39);B.3.G % of enterprises with a Virtual Private Network (1);Total;52,58 1.5. Energy and water (CNAE 35-39);B.3.G % of enterprises with a Virtual Private Network (1);From 10 to 49;40,69 1.5. Energy and water (CNAE 35-39);B.3.G % of enterprises with a Virtual Private Network (1);From 50 to 249;80,45 1.5. Energy and water (CNAE 35-39);B.3.G % of enterprises with a Virtual Private Network (1);250 or more;92,61 1.5. Energy and water (CNAE 35-39);B.3.H % of enterprises that maintain log files to analyze security incidents (1);Total;61,48 1.5. Energy and water (CNAE 35-39);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;55,96 1.5. Energy and water (CNAE 35-39);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;71,59 1.5. Energy and water (CNAE 35-39);B.3.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;88,76 1.5. Energy and water (CNAE 35-39);B.3.J % of enterprises with an ICT risk assessment (1);Total;37,68 1.5. Energy and water (CNAE 35-39);B.3.J % of enterprises with an ICT risk assessment (1);From 10 to 49;30,24 1.5. Energy and water (CNAE 35-39);B.3.J % of enterprises with an ICT risk assessment (1);From 50 to 249;51,82 1.5. Energy and water (CNAE 35-39);B.3.J % of enterprises with an ICT risk assessment (1);250 or more;72,91 1.5. Energy and water (CNAE 35-39);B.3.I % of enterprises with an ICT security test (1);Total;47,14 1.5. Energy and water (CNAE 35-39);B.3.I % of enterprises with an ICT security test (1);From 10 to 49;41,4 1.5. Energy and water (CNAE 35-39);B.3.I % of enterprises with an ICT security test (1);From 50 to 249;57,92 1.5. Energy and water (CNAE 35-39);B.3.I % of enterprises with an ICT security test (1);250 or more;74,81 2. Total Construction (CNAE 41-43);B.3 % of enterprises that apply some ICT security measure;Total;94,2 2. Total Construction (CNAE 41-43);B.3 % of enterprises that apply some ICT security measure;From 10 to 49;93,87 2. Total Construction (CNAE 41-43);B.3 % of enterprises that apply some ICT security measure;From 50 to 249;96,98 2. Total Construction (CNAE 41-43);B.3 % of enterprises that apply some ICT security measure;250 or more;100 2. Total Construction (CNAE 41-43);B.3.A % of enterprises with strong password authentication (1);Total;70,06 2. Total Construction (CNAE 41-43);B.3.A % of enterprises with strong password authentication (1);From 10 to 49;68,95 2. Total Construction (CNAE 41-43);B.3.A % of enterprises with strong password authentication (1);From 50 to 249;79,21 2. Total Construction (CNAE 41-43);B.3.A % of enterprises with strong password authentication (1);250 or more;85,68 2. Total Construction (CNAE 41-43);B.3.B % of enterprises that maintain software updated (1);Total;95,77 2. Total Construction (CNAE 41-43);B.3.B % of enterprises that maintain software updated (1);From 10 to 49;95,69 2. Total Construction (CNAE 41-43);B.3.B % of enterprises that maintain software updated (1);From 50 to 249;96,24 2. Total Construction (CNAE 41-43);B.3.B % of enterprises that maintain software updated (1);250 or more;99,21 2. Total Construction (CNAE 41-43);B.3.C % of enterprises with biometric authentication (1);Total;18,13 2. Total Construction (CNAE 41-43);B.3.C % of enterprises with biometric authentication (1);From 10 to 49;16,8 2. Total Construction (CNAE 41-43);B.3.C % of enterprises with biometric authentication (1);From 50 to 249;29,04 2. Total Construction (CNAE 41-43);B.3.C % of enterprises with biometric authentication (1);250 or more;37,08 2. Total Construction (CNAE 41-43);B.3.D % of enterprises with encryption techniques (1);Total;34,38 2. Total Construction (CNAE 41-43);B.3.D % of enterprises with encryption techniques (1);From 10 to 49;32,94 2. Total Construction (CNAE 41-43);B.3.D % of enterprises with encryption techniques (1);From 50 to 249;45,24 2. Total Construction (CNAE 41-43);B.3.D % of enterprises with encryption techniques (1);250 or more;65,65 2. Total Construction (CNAE 41-43);B.3.E % of enterprises with data backup in a separate location (1);Total;85,54 2. Total Construction (CNAE 41-43);B.3.E % of enterprises with data backup in a separate location (1);From 10 to 49;85,19 2. Total Construction (CNAE 41-43);B.3.E % of enterprises with data backup in a separate location (1);From 50 to 249;88,3 2. Total Construction (CNAE 41-43);B.3.E % of enterprises with data backup in a separate location (1);250 or more;92,18 2. Total Construction (CNAE 41-43);B.3.F % of enterprises with control of network access (1);Total;73,05 2. Total Construction (CNAE 41-43);B.3.F % of enterprises with control of network access (1);From 10 to 49;72,23 2. Total Construction (CNAE 41-43);B.3.F % of enterprises with control of network access (1);From 50 to 249;79,41 2. Total Construction (CNAE 41-43);B.3.F % of enterprises with control of network access (1);250 or more;88,92 2. Total Construction (CNAE 41-43);B.3.G % of enterprises with a Virtual Private Network (1);Total;29,39 2. Total Construction (CNAE 41-43);B.3.G % of enterprises with a Virtual Private Network (1);From 10 to 49;25,94 2. Total Construction (CNAE 41-43);B.3.G % of enterprises with a Virtual Private Network (1);From 50 to 249;56,95 2. Total Construction (CNAE 41-43);B.3.G % of enterprises with a Virtual Private Network (1);250 or more;86,93 2. Total Construction (CNAE 41-43);B.3.H % of enterprises that maintain log files to analyze security incidents (1);Total;39,37 2. Total Construction (CNAE 41-43);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;37,33 2. Total Construction (CNAE 41-43);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;55,87 2. Total Construction (CNAE 41-43);B.3.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;70,63 2. Total Construction (CNAE 41-43);B.3.J % of enterprises with an ICT risk assessment (1);Total;27,2 2. Total Construction (CNAE 41-43);B.3.J % of enterprises with an ICT risk assessment (1);From 10 to 49;25,29 2. Total Construction (CNAE 41-43);B.3.J % of enterprises with an ICT risk assessment (1);From 50 to 249;41,71 2. Total Construction (CNAE 41-43);B.3.J % of enterprises with an ICT risk assessment (1);250 or more;67,4 2. Total Construction (CNAE 41-43);B.3.I % of enterprises with an ICT security test (1);Total;34,99 2. Total Construction (CNAE 41-43);B.3.I % of enterprises with an ICT security test (1);From 10 to 49;33,62 2. Total Construction (CNAE 41-43);B.3.I % of enterprises with an ICT security test (1);From 50 to 249;45,65 2. Total Construction (CNAE 41-43);B.3.I % of enterprises with an ICT security test (1);250 or more;61,54 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3 % of enterprises that apply some ICT security measure;Total;97,21 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3 % of enterprises that apply some ICT security measure;From 10 to 49;96,97 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3 % of enterprises that apply some ICT security measure;From 50 to 249;98,19 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3 % of enterprises that apply some ICT security measure;250 or more;98,9 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.A % of enterprises with strong password authentication (1);Total;77,73 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.A % of enterprises with strong password authentication (1);From 10 to 49;76,07 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.A % of enterprises with strong password authentication (1);From 50 to 249;83,84 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.A % of enterprises with strong password authentication (1);250 or more;90,84 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.B % of enterprises that maintain software updated (1);Total;97,05 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.B % of enterprises that maintain software updated (1);From 10 to 49;96,99 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.B % of enterprises that maintain software updated (1);From 50 to 249;97,13 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.B % of enterprises that maintain software updated (1);250 or more;98,3 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.C % of enterprises with biometric authentication (1);Total;24,86 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.C % of enterprises with biometric authentication (1);From 10 to 49;23,08 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.C % of enterprises with biometric authentication (1);From 50 to 249;31,33 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.C % of enterprises with biometric authentication (1);250 or more;39,15 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.D % of enterprises with encryption techniques (1);Total;46,55 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.D % of enterprises with encryption techniques (1);From 10 to 49;43,9 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.D % of enterprises with encryption techniques (1);From 50 to 249;55,87 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.D % of enterprises with encryption techniques (1);250 or more;69,66 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.E % of enterprises with data backup in a separate location (1);Total;92,94 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.E % of enterprises with data backup in a separate location (1);From 10 to 49;92,35 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.E % of enterprises with data backup in a separate location (1);From 50 to 249;95,33 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.E % of enterprises with data backup in a separate location (1);250 or more;96,58 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.F % of enterprises with control of network access (1);Total;84,13 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.F % of enterprises with control of network access (1);From 10 to 49;82,64 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.F % of enterprises with control of network access (1);From 50 to 249;89,71 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.F % of enterprises with control of network access (1);250 or more;95,48 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.G % of enterprises with a Virtual Private Network (1);Total;53,4 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.G % of enterprises with a Virtual Private Network (1);From 10 to 49;49 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.G % of enterprises with a Virtual Private Network (1);From 50 to 249;70,24 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.G % of enterprises with a Virtual Private Network (1);250 or more;85,29 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.H % of enterprises that maintain log files to analyze security incidents (1);Total;57,36 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;54,35 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;68,36 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;81,48 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.J % of enterprises with an ICT risk assessment (1);Total;43,46 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.J % of enterprises with an ICT risk assessment (1);From 10 to 49;40,41 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.J % of enterprises with an ICT risk assessment (1);From 50 to 249;54,09 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.J % of enterprises with an ICT risk assessment (1);250 or more;70,36 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.I % of enterprises with an ICT security test (1);Total;46,12 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.I % of enterprises with an ICT security test (1);From 10 to 49;42,81 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.I % of enterprises with an ICT security test (1);From 50 to 249;58,42 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services);B.3.I % of enterprises with an ICT security test (1);250 or more;71,75 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3 % of enterprises that apply some ICT security measure;Total;98,02 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3 % of enterprises that apply some ICT security measure;From 10 to 49;97,91 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3 % of enterprises that apply some ICT security measure;From 50 to 249;98,74 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3 % of enterprises that apply some ICT security measure;250 or more;97,94 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.A % of enterprises with strong password authentication (1);Total;73,92 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.A % of enterprises with strong password authentication (1);From 10 to 49;72,91 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.A % of enterprises with strong password authentication (1);From 50 to 249;78,54 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.A % of enterprises with strong password authentication (1);250 or more;86,56 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.B % of enterprises that maintain software updated (1);Total;96,04 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.B % of enterprises that maintain software updated (1);From 10 to 49;96,05 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.B % of enterprises that maintain software updated (1);From 50 to 249;95,77 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.B % of enterprises that maintain software updated (1);250 or more;97,52 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.C % of enterprises with biometric authentication (1);Total;22,43 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.C % of enterprises with biometric authentication (1);From 10 to 49;20,81 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.C % of enterprises with biometric authentication (1);From 50 to 249;30,02 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.C % of enterprises with biometric authentication (1);250 or more;40,96 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.D % of enterprises with encryption techniques (1);Total;43,07 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.D % of enterprises with encryption techniques (1);From 10 to 49;41,03 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.D % of enterprises with encryption techniques (1);From 50 to 249;52,18 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.D % of enterprises with encryption techniques (1);250 or more;69,4 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.E % of enterprises with data backup in a separate location (1);Total;93,43 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.E % of enterprises with data backup in a separate location (1);From 10 to 49;92,97 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.E % of enterprises with data backup in a separate location (1);From 50 to 249;96,24 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.E % of enterprises with data backup in a separate location (1);250 or more;94,9 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.F % of enterprises with control of network access (1);Total;84,28 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.F % of enterprises with control of network access (1);From 10 to 49;83,38 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.F % of enterprises with control of network access (1);From 50 to 249;88,21 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.F % of enterprises with control of network access (1);250 or more;96,39 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.G % of enterprises with a Virtual Private Network (1);Total;49,59 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.G % of enterprises with a Virtual Private Network (1);From 10 to 49;45,59 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.G % of enterprises with a Virtual Private Network (1);From 50 to 249;69,6 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.G % of enterprises with a Virtual Private Network (1);250 or more;88 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.H % of enterprises that maintain log files to analyze security incidents (1);Total;55,61 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;53,19 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;67,1 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;82,63 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.J % of enterprises with an ICT risk assessment (1);Total;39,17 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.J % of enterprises with an ICT risk assessment (1);From 10 to 49;36,62 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.J % of enterprises with an ICT risk assessment (1);From 50 to 249;51,31 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.J % of enterprises with an ICT risk assessment (1);250 or more;67,59 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.I % of enterprises with an ICT security test (1);Total;44,01 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.I % of enterprises with an ICT security test (1);From 10 to 49;41,54 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.I % of enterprises with an ICT security test (1);From 50 to 249;56,14 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);B.3.I % of enterprises with an ICT security test (1);250 or more;68,71 3.2. Transport and storage (CNAE 49-53);B.3 % of enterprises that apply some ICT security measure;Total;96,52 3.2. Transport and storage (CNAE 49-53);B.3 % of enterprises that apply some ICT security measure;From 10 to 49;95,99 3.2. Transport and storage (CNAE 49-53);B.3 % of enterprises that apply some ICT security measure;From 50 to 249;99,13 3.2. Transport and storage (CNAE 49-53);B.3 % of enterprises that apply some ICT security measure;250 or more;99,52 3.2. Transport and storage (CNAE 49-53);B.3.A % of enterprises with strong password authentication (1);Total;75,59 3.2. Transport and storage (CNAE 49-53);B.3.A % of enterprises with strong password authentication (1);From 10 to 49;73,44 3.2. Transport and storage (CNAE 49-53);B.3.A % of enterprises with strong password authentication (1);From 50 to 249;84,34 3.2. Transport and storage (CNAE 49-53);B.3.A % of enterprises with strong password authentication (1);250 or more;94,41 3.2. Transport and storage (CNAE 49-53);B.3.B % of enterprises that maintain software updated (1);Total;96,94 3.2. Transport and storage (CNAE 49-53);B.3.B % of enterprises that maintain software updated (1);From 10 to 49;96,91 3.2. Transport and storage (CNAE 49-53);B.3.B % of enterprises that maintain software updated (1);From 50 to 249;96,78 3.2. Transport and storage (CNAE 49-53);B.3.B % of enterprises that maintain software updated (1);250 or more;98,73 3.2. Transport and storage (CNAE 49-53);B.3.C % of enterprises with biometric authentication (1);Total;24,61 3.2. Transport and storage (CNAE 49-53);B.3.C % of enterprises with biometric authentication (1);From 10 to 49;23,09 3.2. Transport and storage (CNAE 49-53);B.3.C % of enterprises with biometric authentication (1);From 50 to 249;29,46 3.2. Transport and storage (CNAE 49-53);B.3.C % of enterprises with biometric authentication (1);250 or more;44,83 3.2. Transport and storage (CNAE 49-53);B.3.D % of enterprises with encryption techniques (1);Total;43,39 3.2. Transport and storage (CNAE 49-53);B.3.D % of enterprises with encryption techniques (1);From 10 to 49;41,41 3.2. Transport and storage (CNAE 49-53);B.3.D % of enterprises with encryption techniques (1);From 50 to 249;50,43 3.2. Transport and storage (CNAE 49-53);B.3.D % of enterprises with encryption techniques (1);250 or more;66,27 3.2. Transport and storage (CNAE 49-53);B.3.E % of enterprises with data backup in a separate location (1);Total;89,65 3.2. Transport and storage (CNAE 49-53);B.3.E % of enterprises with data backup in a separate location (1);From 10 to 49;88,62 3.2. Transport and storage (CNAE 49-53);B.3.E % of enterprises with data backup in a separate location (1);From 50 to 249;94,34 3.2. Transport and storage (CNAE 49-53);B.3.E % of enterprises with data backup in a separate location (1);250 or more;96,2 3.2. Transport and storage (CNAE 49-53);B.3.F % of enterprises with control of network access (1);Total;82,23 3.2. Transport and storage (CNAE 49-53);B.3.F % of enterprises with control of network access (1);From 10 to 49;80,18 3.2. Transport and storage (CNAE 49-53);B.3.F % of enterprises with control of network access (1);From 50 to 249;91 3.2. Transport and storage (CNAE 49-53);B.3.F % of enterprises with control of network access (1);250 or more;97,79 3.2. Transport and storage (CNAE 49-53);B.3.G % of enterprises with a Virtual Private Network (1);Total;44,92 3.2. Transport and storage (CNAE 49-53);B.3.G % of enterprises with a Virtual Private Network (1);From 10 to 49;39,51 3.2. Transport and storage (CNAE 49-53);B.3.G % of enterprises with a Virtual Private Network (1);From 50 to 249;67,03 3.2. Transport and storage (CNAE 49-53);B.3.G % of enterprises with a Virtual Private Network (1);250 or more;91,55 3.2. Transport and storage (CNAE 49-53);B.3.H % of enterprises that maintain log files to analyze security incidents (1);Total;50,31 3.2. Transport and storage (CNAE 49-53);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;45,96 3.2. Transport and storage (CNAE 49-53);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;68,63 3.2. Transport and storage (CNAE 49-53);B.3.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;85,13 3.2. Transport and storage (CNAE 49-53);B.3.J % of enterprises with an ICT risk assessment (1);Total;40,68 3.2. Transport and storage (CNAE 49-53);B.3.J % of enterprises with an ICT risk assessment (1);From 10 to 49;37,18 3.2. Transport and storage (CNAE 49-53);B.3.J % of enterprises with an ICT risk assessment (1);From 50 to 249;54,57 3.2. Transport and storage (CNAE 49-53);B.3.J % of enterprises with an ICT risk assessment (1);250 or more;73,11 3.2. Transport and storage (CNAE 49-53);B.3.I % of enterprises with an ICT security test (1);Total;41,73 3.2. Transport and storage (CNAE 49-53);B.3.I % of enterprises with an ICT security test (1);From 10 to 49;37,94 3.2. Transport and storage (CNAE 49-53);B.3.I % of enterprises with an ICT security test (1);From 50 to 249;57,09 3.2. Transport and storage (CNAE 49-53);B.3.I % of enterprises with an ICT security test (1);250 or more;75,41 3.3. Accommodation services (CNAE 55);B.3 % of enterprises that apply some ICT security measure;Total;99,23 3.3. Accommodation services (CNAE 55);B.3 % of enterprises that apply some ICT security measure;From 10 to 49;99,63 3.3. Accommodation services (CNAE 55);B.3 % of enterprises that apply some ICT security measure;From 50 to 249;97,76 3.3. Accommodation services (CNAE 55);B.3 % of enterprises that apply some ICT security measure;250 or more;100 3.3. Accommodation services (CNAE 55);B.3.A % of enterprises with strong password authentication (1);Total;78,2 3.3. Accommodation services (CNAE 55);B.3.A % of enterprises with strong password authentication (1);From 10 to 49;75,55 3.3. Accommodation services (CNAE 55);B.3.A % of enterprises with strong password authentication (1);From 50 to 249;85,26 3.3. Accommodation services (CNAE 55);B.3.A % of enterprises with strong password authentication (1);250 or more;92,28 3.3. Accommodation services (CNAE 55);B.3.B % of enterprises that maintain software updated (1);Total;98,09 3.3. Accommodation services (CNAE 55);B.3.B % of enterprises that maintain software updated (1);From 10 to 49;98,3 3.3. Accommodation services (CNAE 55);B.3.B % of enterprises that maintain software updated (1);From 50 to 249;97,04 3.3. Accommodation services (CNAE 55);B.3.B % of enterprises that maintain software updated (1);250 or more;100 3.3. Accommodation services (CNAE 55);B.3.C % of enterprises with biometric authentication (1);Total;28,71 3.3. Accommodation services (CNAE 55);B.3.C % of enterprises with biometric authentication (1);From 10 to 49;26,28 3.3. Accommodation services (CNAE 55);B.3.C % of enterprises with biometric authentication (1);From 50 to 249;35,08 3.3. Accommodation services (CNAE 55);B.3.C % of enterprises with biometric authentication (1);250 or more;42,43 3.3. Accommodation services (CNAE 55);B.3.D % of enterprises with encryption techniques (1);Total;44,16 3.3. Accommodation services (CNAE 55);B.3.D % of enterprises with encryption techniques (1);From 10 to 49;39,44 3.3. Accommodation services (CNAE 55);B.3.D % of enterprises with encryption techniques (1);From 50 to 249;56,47 3.3. Accommodation services (CNAE 55);B.3.D % of enterprises with encryption techniques (1);250 or more;70,76 3.3. Accommodation services (CNAE 55);B.3.E % of enterprises with data backup in a separate location (1);Total;94,41 3.3. Accommodation services (CNAE 55);B.3.E % of enterprises with data backup in a separate location (1);From 10 to 49;94,59 3.3. Accommodation services (CNAE 55);B.3.E % of enterprises with data backup in a separate location (1);From 50 to 249;93,58 3.3. Accommodation services (CNAE 55);B.3.E % of enterprises with data backup in a separate location (1);250 or more;95,67 3.3. Accommodation services (CNAE 55);B.3.F % of enterprises with control of network access (1);Total;88,26 3.3. Accommodation services (CNAE 55);B.3.F % of enterprises with control of network access (1);From 10 to 49;85,61 3.3. Accommodation services (CNAE 55);B.3.F % of enterprises with control of network access (1);From 50 to 249;96,55 3.3. Accommodation services (CNAE 55);B.3.F % of enterprises with control of network access (1);250 or more;94,79 3.3. Accommodation services (CNAE 55);B.3.G % of enterprises with a Virtual Private Network (1);Total;57,53 3.3. Accommodation services (CNAE 55);B.3.G % of enterprises with a Virtual Private Network (1);From 10 to 49;51,8 3.3. Accommodation services (CNAE 55);B.3.G % of enterprises with a Virtual Private Network (1);From 50 to 249;72,56 3.3. Accommodation services (CNAE 55);B.3.G % of enterprises with a Virtual Private Network (1);250 or more;89,54 3.3. Accommodation services (CNAE 55);B.3.H % of enterprises that maintain log files to analyze security incidents (1);Total;61,32 3.3. Accommodation services (CNAE 55);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;57,68 3.3. Accommodation services (CNAE 55);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;71,1 3.3. Accommodation services (CNAE 55);B.3.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;80,29 3.3. Accommodation services (CNAE 55);B.3.J % of enterprises with an ICT risk assessment (1);Total;42,07 3.3. Accommodation services (CNAE 55);B.3.J % of enterprises with an ICT risk assessment (1);From 10 to 49;37,68 3.3. Accommodation services (CNAE 55);B.3.J % of enterprises with an ICT risk assessment (1);From 50 to 249;54,54 3.3. Accommodation services (CNAE 55);B.3.J % of enterprises with an ICT risk assessment (1);250 or more;60,79 3.3. Accommodation services (CNAE 55);B.3.I % of enterprises with an ICT security test (1);Total;47,56 3.3. Accommodation services (CNAE 55);B.3.I % of enterprises with an ICT security test (1);From 10 to 49;43,93 3.3. Accommodation services (CNAE 55);B.3.I % of enterprises with an ICT security test (1);From 50 to 249;57,32 3.3. Accommodation services (CNAE 55);B.3.I % of enterprises with an ICT security test (1);250 or more;66,23 3.4. Information and communications (CNAE 58-63);B.3 % of enterprises that apply some ICT security measure;Total;99,69 3.4. Information and communications (CNAE 58-63);B.3 % of enterprises that apply some ICT security measure;From 10 to 49;99,59 3.4. Information and communications (CNAE 58-63);B.3 % of enterprises that apply some ICT security measure;From 50 to 249;100 3.4. Information and communications (CNAE 58-63);B.3 % of enterprises that apply some ICT security measure;250 or more;100 3.4. Information and communications (CNAE 58-63);B.3.A % of enterprises with strong password authentication (1);Total;90,64 3.4. Information and communications (CNAE 58-63);B.3.A % of enterprises with strong password authentication (1);From 10 to 49;88,33 3.4. Information and communications (CNAE 58-63);B.3.A % of enterprises with strong password authentication (1);From 50 to 249;97,58 3.4. Information and communications (CNAE 58-63);B.3.A % of enterprises with strong password authentication (1);250 or more;99,51 3.4. Information and communications (CNAE 58-63);B.3.B % of enterprises that maintain software updated (1);Total;99,25 3.4. Information and communications (CNAE 58-63);B.3.B % of enterprises that maintain software updated (1);From 10 to 49;99,23 3.4. Information and communications (CNAE 58-63);B.3.B % of enterprises that maintain software updated (1);From 50 to 249;99,15 3.4. Information and communications (CNAE 58-63);B.3.B % of enterprises that maintain software updated (1);250 or more;100 3.4. Information and communications (CNAE 58-63);B.3.C % of enterprises with biometric authentication (1);Total;32,22 3.4. Information and communications (CNAE 58-63);B.3.C % of enterprises with biometric authentication (1);From 10 to 49;29,52 3.4. Information and communications (CNAE 58-63);B.3.C % of enterprises with biometric authentication (1);From 50 to 249;40,89 3.4. Information and communications (CNAE 58-63);B.3.C % of enterprises with biometric authentication (1);250 or more;40,25 3.4. Information and communications (CNAE 58-63);B.3.D % of enterprises with encryption techniques (1);Total;67,71 3.4. Information and communications (CNAE 58-63);B.3.D % of enterprises with encryption techniques (1);From 10 to 49;63,76 3.4. Information and communications (CNAE 58-63);B.3.D % of enterprises with encryption techniques (1);From 50 to 249;78,87 3.4. Information and communications (CNAE 58-63);B.3.D % of enterprises with encryption techniques (1);250 or more;85,72 3.4. Information and communications (CNAE 58-63);B.3.E % of enterprises with data backup in a separate location (1);Total;94,8 3.4. Information and communications (CNAE 58-63);B.3.E % of enterprises with data backup in a separate location (1);From 10 to 49;93,9 3.4. Information and communications (CNAE 58-63);B.3.E % of enterprises with data backup in a separate location (1);From 50 to 249;97,22 3.4. Information and communications (CNAE 58-63);B.3.E % of enterprises with data backup in a separate location (1);250 or more;99,5 3.4. Information and communications (CNAE 58-63);B.3.F % of enterprises with control of network access (1);Total;91,16 3.4. Information and communications (CNAE 58-63);B.3.F % of enterprises with control of network access (1);From 10 to 49;89,96 3.4. Information and communications (CNAE 58-63);B.3.F % of enterprises with control of network access (1);From 50 to 249;94,11 3.4. Information and communications (CNAE 58-63);B.3.F % of enterprises with control of network access (1);250 or more;98,44 3.4. Information and communications (CNAE 58-63);B.3.G % of enterprises with a Virtual Private Network (1);Total;75,9 3.4. Information and communications (CNAE 58-63);B.3.G % of enterprises with a Virtual Private Network (1);From 10 to 49;71,74 3.4. Information and communications (CNAE 58-63);B.3.G % of enterprises with a Virtual Private Network (1);From 50 to 249;87,95 3.4. Information and communications (CNAE 58-63);B.3.G % of enterprises with a Virtual Private Network (1);250 or more;93,54 3.4. Information and communications (CNAE 58-63);B.3.H % of enterprises that maintain log files to analyze security incidents (1);Total;75,18 3.4. Information and communications (CNAE 58-63);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;71,12 3.4. Information and communications (CNAE 58-63);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;86,11 3.4. Information and communications (CNAE 58-63);B.3.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;96,09 3.4. Information and communications (CNAE 58-63);B.3.J % of enterprises with an ICT risk assessment (1);Total;64,92 3.4. Information and communications (CNAE 58-63);B.3.J % of enterprises with an ICT risk assessment (1);From 10 to 49;60,25 3.4. Information and communications (CNAE 58-63);B.3.J % of enterprises with an ICT risk assessment (1);From 50 to 249;75,93 3.4. Information and communications (CNAE 58-63);B.3.J % of enterprises with an ICT risk assessment (1);250 or more;95,6 3.4. Information and communications (CNAE 58-63);B.3.I % of enterprises with an ICT security test (1);Total;62,86 3.4. Information and communications (CNAE 58-63);B.3.I % of enterprises with an ICT security test (1);From 10 to 49;57,68 3.4. Information and communications (CNAE 58-63);B.3.I % of enterprises with an ICT security test (1);From 50 to 249;75,67 3.4. Information and communications (CNAE 58-63);B.3.I % of enterprises with an ICT security test (1);250 or more;94,3 3.5. Real estate activities (CNAE 68);B.3 % of enterprises that apply some ICT security measure;Total;97,66 3.5. Real estate activities (CNAE 68);B.3 % of enterprises that apply some ICT security measure;From 10 to 49;97,88 3.5. Real estate activities (CNAE 68);B.3 % of enterprises that apply some ICT security measure;From 50 to 249;94,57 3.5. Real estate activities (CNAE 68);B.3 % of enterprises that apply some ICT security measure;250 or more;100 3.5. Real estate activities (CNAE 68);B.3.A % of enterprises with strong password authentication (1);Total;82,48 3.5. Real estate activities (CNAE 68);B.3.A % of enterprises with strong password authentication (1);From 10 to 49;81,89 3.5. Real estate activities (CNAE 68);B.3.A % of enterprises with strong password authentication (1);From 50 to 249;86,81 3.5. Real estate activities (CNAE 68);B.3.A % of enterprises with strong password authentication (1);250 or more;95,51 3.5. Real estate activities (CNAE 68);B.3.B % of enterprises that maintain software updated (1);Total;95,14 3.5. Real estate activities (CNAE 68);B.3.B % of enterprises that maintain software updated (1);From 10 to 49;94,66 3.5. Real estate activities (CNAE 68);B.3.B % of enterprises that maintain software updated (1);From 50 to 249;100 3.5. Real estate activities (CNAE 68);B.3.B % of enterprises that maintain software updated (1);250 or more;100 3.5. Real estate activities (CNAE 68);B.3.C % of enterprises with biometric authentication (1);Total;15,03 3.5. Real estate activities (CNAE 68);B.3.C % of enterprises with biometric authentication (1);From 10 to 49;13,11 3.5. Real estate activities (CNAE 68);B.3.C % of enterprises with biometric authentication (1);From 50 to 249;32,13 3.5. Real estate activities (CNAE 68);B.3.C % of enterprises with biometric authentication (1);250 or more;43,38 3.5. Real estate activities (CNAE 68);B.3.D % of enterprises with encryption techniques (1);Total;31,24 3.5. Real estate activities (CNAE 68);B.3.D % of enterprises with encryption techniques (1);From 10 to 49;28,14 3.5. Real estate activities (CNAE 68);B.3.D % of enterprises with encryption techniques (1);From 50 to 249;60,9 3.5. Real estate activities (CNAE 68);B.3.D % of enterprises with encryption techniques (1);250 or more;68,59 3.5. Real estate activities (CNAE 68);B.3.E % of enterprises with data backup in a separate location (1);Total;94,44 3.5. Real estate activities (CNAE 68);B.3.E % of enterprises with data backup in a separate location (1);From 10 to 49;93,96 3.5. Real estate activities (CNAE 68);B.3.E % of enterprises with data backup in a separate location (1);From 50 to 249;99 3.5. Real estate activities (CNAE 68);B.3.E % of enterprises with data backup in a separate location (1);250 or more;100 3.5. Real estate activities (CNAE 68);B.3.F % of enterprises with control of network access (1);Total;86,43 3.5. Real estate activities (CNAE 68);B.3.F % of enterprises with control of network access (1);From 10 to 49;85,15 3.5. Real estate activities (CNAE 68);B.3.F % of enterprises with control of network access (1);From 50 to 249;100 3.5. Real estate activities (CNAE 68);B.3.F % of enterprises with control of network access (1);250 or more;95,51 3.5. Real estate activities (CNAE 68);B.3.G % of enterprises with a Virtual Private Network (1);Total;63,18 3.5. Real estate activities (CNAE 68);B.3.G % of enterprises with a Virtual Private Network (1);From 10 to 49;60,3 3.5. Real estate activities (CNAE 68);B.3.G % of enterprises with a Virtual Private Network (1);From 50 to 249;90,17 3.5. Real estate activities (CNAE 68);B.3.G % of enterprises with a Virtual Private Network (1);250 or more;100 3.5. Real estate activities (CNAE 68);B.3.H % of enterprises that maintain log files to analyze security incidents (1);Total;60,73 3.5. Real estate activities (CNAE 68);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;57,4 3.5. Real estate activities (CNAE 68);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;94,13 3.5. Real estate activities (CNAE 68);B.3.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;93,37 3.5. Real estate activities (CNAE 68);B.3.J % of enterprises with an ICT risk assessment (1);Total;39,24 3.5. Real estate activities (CNAE 68);B.3.J % of enterprises with an ICT risk assessment (1);From 10 to 49;35,31 3.5. Real estate activities (CNAE 68);B.3.J % of enterprises with an ICT risk assessment (1);From 50 to 249;82,15 3.5. Real estate activities (CNAE 68);B.3.J % of enterprises with an ICT risk assessment (1);250 or more;62,45 3.5. Real estate activities (CNAE 68);B.3.I % of enterprises with an ICT security test (1);Total;39,62 3.5. Real estate activities (CNAE 68);B.3.I % of enterprises with an ICT security test (1);From 10 to 49;35,52 3.5. Real estate activities (CNAE 68);B.3.I % of enterprises with an ICT security test (1);From 50 to 249;79,72 3.5. Real estate activities (CNAE 68);B.3.I % of enterprises with an ICT security test (1);250 or more;84,39 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3 % of enterprises that apply some ICT security measure;Total;99,53 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3 % of enterprises that apply some ICT security measure;From 10 to 49;99,47 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3 % of enterprises that apply some ICT security measure;From 50 to 249;99,83 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3 % of enterprises that apply some ICT security measure;250 or more;100 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.A % of enterprises with strong password authentication (1);Total;85,11 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.A % of enterprises with strong password authentication (1);From 10 to 49;83,14 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.A % of enterprises with strong password authentication (1);From 50 to 249;93,98 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.A % of enterprises with strong password authentication (1);250 or more;96,79 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.B % of enterprises that maintain software updated (1);Total;98,61 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.B % of enterprises that maintain software updated (1);From 10 to 49;98,75 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.B % of enterprises that maintain software updated (1);From 50 to 249;97,95 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.B % of enterprises that maintain software updated (1);250 or more;97,88 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.C % of enterprises with biometric authentication (1);Total;26,87 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.C % of enterprises with biometric authentication (1);From 10 to 49;26,2 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.C % of enterprises with biometric authentication (1);From 50 to 249;28,17 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.C % of enterprises with biometric authentication (1);250 or more;39,85 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.D % of enterprises with encryption techniques (1);Total;60,64 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.D % of enterprises with encryption techniques (1);From 10 to 49;57,44 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.D % of enterprises with encryption techniques (1);From 50 to 249;73,56 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.D % of enterprises with encryption techniques (1);250 or more;87,32 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.E % of enterprises with data backup in a separate location (1);Total;95,24 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.E % of enterprises with data backup in a separate location (1);From 10 to 49;94,66 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.E % of enterprises with data backup in a separate location (1);From 50 to 249;98,63 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.E % of enterprises with data backup in a separate location (1);250 or more;94,69 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.F % of enterprises with control of network access (1);Total;91,86 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.F % of enterprises with control of network access (1);From 10 to 49;90,63 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.F % of enterprises with control of network access (1);From 50 to 249;97,58 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.F % of enterprises with control of network access (1);250 or more;98,21 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.G % of enterprises with a Virtual Private Network (1);Total;69,63 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.G % of enterprises with a Virtual Private Network (1);From 10 to 49;65,78 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.G % of enterprises with a Virtual Private Network (1);From 50 to 249;86,9 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.G % of enterprises with a Virtual Private Network (1);250 or more;93,12 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.H % of enterprises that maintain log files to analyze security incidents (1);Total;70,67 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;67,16 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;86,3 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;92,86 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.J % of enterprises with an ICT risk assessment (1);Total;55,08 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.J % of enterprises with an ICT risk assessment (1);From 10 to 49;52,38 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.J % of enterprises with an ICT risk assessment (1);From 50 to 249;66,01 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.J % of enterprises with an ICT risk assessment (1);250 or more;77,71 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.I % of enterprises with an ICT security test (1);Total;56,5 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.I % of enterprises with an ICT security test (1);From 10 to 49;52,22 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.I % of enterprises with an ICT security test (1);From 50 to 249;75,23 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74);B.3.I % of enterprises with an ICT security test (1);250 or more;84,82 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3 % of enterprises that apply some ICT security measure;Total;91,39 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3 % of enterprises that apply some ICT security measure;From 10 to 49;89,87 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3 % of enterprises that apply some ICT security measure;From 50 to 249;94,95 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3 % of enterprises that apply some ICT security measure;250 or more;98,46 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.A % of enterprises with strong password authentication (1);Total;76,23 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.A % of enterprises with strong password authentication (1);From 10 to 49;74,51 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.A % of enterprises with strong password authentication (1);From 50 to 249;78,81 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.A % of enterprises with strong password authentication (1);250 or more;87,38 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.B % of enterprises that maintain software updated (1);Total;97,28 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.B % of enterprises that maintain software updated (1);From 10 to 49;96,93 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.B % of enterprises that maintain software updated (1);From 50 to 249;98,3 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.B % of enterprises that maintain software updated (1);250 or more;98,04 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.C % of enterprises with biometric authentication (1);Total;26,28 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.C % of enterprises with biometric authentication (1);From 10 to 49;24,26 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.C % of enterprises with biometric authentication (1);From 50 to 249;31,12 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.C % of enterprises with biometric authentication (1);250 or more;33,64 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.D % of enterprises with encryption techniques (1);Total;37,77 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.D % of enterprises with encryption techniques (1);From 10 to 49;34,84 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.D % of enterprises with encryption techniques (1);From 50 to 249;41,96 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.D % of enterprises with encryption techniques (1);250 or more;57,44 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.E % of enterprises with data backup in a separate location (1);Total;90,39 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.E % of enterprises with data backup in a separate location (1);From 10 to 49;89,38 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.E % of enterprises with data backup in a separate location (1);From 50 to 249;91,5 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.E % of enterprises with data backup in a separate location (1);250 or more;98,23 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.F % of enterprises with control of network access (1);Total;71,9 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.F % of enterprises with control of network access (1);From 10 to 49;67,79 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.F % of enterprises with control of network access (1);From 50 to 249;80,31 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.F % of enterprises with control of network access (1);250 or more;91,58 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.G % of enterprises with a Virtual Private Network (1);Total;41,73 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.G % of enterprises with a Virtual Private Network (1);From 10 to 49;36,45 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.G % of enterprises with a Virtual Private Network (1);From 50 to 249;50,81 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.G % of enterprises with a Virtual Private Network (1);250 or more;72,41 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.H % of enterprises that maintain log files to analyze security incidents (1);Total;44,38 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;41,65 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;46,39 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;68,58 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.J % of enterprises with an ICT risk assessment (1);Total;37,26 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.J % of enterprises with an ICT risk assessment (1);From 10 to 49;34,75 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.J % of enterprises with an ICT risk assessment (1);From 50 to 249;38,26 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.J % of enterprises with an ICT risk assessment (1);250 or more;62,11 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.I % of enterprises with an ICT security test (1);Total;37,69 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.I % of enterprises with an ICT security test (1);From 10 to 49;34,35 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.I % of enterprises with an ICT security test (1);From 50 to 249;42,44 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);B.3.I % of enterprises with an ICT security test (1);250 or more;60,23 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3 % of enterprises that apply some ICT security measure;Total;100 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3 % of enterprises that apply some ICT security measure;From 10 to 49;100 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3 % of enterprises that apply some ICT security measure;From 50 to 249;100 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3 % of enterprises that apply some ICT security measure;250 or more;100 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.A % of enterprises with strong password authentication (1);Total;93,59 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.A % of enterprises with strong password authentication (1);From 10 to 49;92,59 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.A % of enterprises with strong password authentication (1);From 50 to 249;95,92 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.A % of enterprises with strong password authentication (1);250 or more;99,05 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.B % of enterprises that maintain software updated (1);Total;99,49 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.B % of enterprises that maintain software updated (1);From 10 to 49;99,4 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.B % of enterprises that maintain software updated (1);From 50 to 249;99,7 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.B % of enterprises that maintain software updated (1);250 or more;100 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.C % of enterprises with biometric authentication (1);Total;37,06 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.C % of enterprises with biometric authentication (1);From 10 to 49;34,81 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.C % of enterprises with biometric authentication (1);From 50 to 249;42,54 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.C % of enterprises with biometric authentication (1);250 or more;48,17 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.D % of enterprises with encryption techniques (1);Total;69,61 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.D % of enterprises with encryption techniques (1);From 10 to 49;66,47 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.D % of enterprises with encryption techniques (1);From 50 to 249;76,77 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.D % of enterprises with encryption techniques (1);250 or more;87,27 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.E % of enterprises with data backup in a separate location (1);Total;95,26 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.E % of enterprises with data backup in a separate location (1);From 10 to 49;94,67 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.E % of enterprises with data backup in a separate location (1);From 50 to 249;96,43 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.E % of enterprises with data backup in a separate location (1);250 or more;99,44 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.F % of enterprises with control of network access (1);Total;91,93 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.F % of enterprises with control of network access (1);From 10 to 49;90,3 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.F % of enterprises with control of network access (1);From 50 to 249;96,08 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.F % of enterprises with control of network access (1);250 or more;98,93 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.G % of enterprises with a Virtual Private Network (1);Total;83,38 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.G % of enterprises with a Virtual Private Network (1);From 10 to 49;80,94 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.G % of enterprises with a Virtual Private Network (1);From 50 to 249;89,63 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.G % of enterprises with a Virtual Private Network (1);250 or more;93,73 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.H % of enterprises that maintain log files to analyze security incidents (1);Total;78,02 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;74,8 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;85,31 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;96,56 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.J % of enterprises with an ICT risk assessment (1);Total;66,54 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.J % of enterprises with an ICT risk assessment (1);From 10 to 49;62,19 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.J % of enterprises with an ICT risk assessment (1);From 50 to 249;75,44 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.J % of enterprises with an ICT risk assessment (1);250 or more;96,07 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.I % of enterprises with an ICT security test (1);Total;67,72 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.I % of enterprises with an ICT security test (1);From 10 to 49;64,33 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.I % of enterprises with an ICT security test (1);From 50 to 249;74,06 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);B.3.I % of enterprises with an ICT security test (1);250 or more;93,65