Activity grouping (except CNAE 56, 64-66 and 95.1);Main variables;Size of the enterprise;Total Total Enterprises;J.1 % of enterprises that apply some ICT security measure;Total;91,98 Total Enterprises;J.1 % of enterprises that apply some ICT security measure;From 10 to 49;91,1 Total Enterprises;J.1 % of enterprises that apply some ICT security measure;From 50 to 249;96,06 Total Enterprises;J.1 % of enterprises that apply some ICT security measure;250 or more;99 Total Enterprises;J.1.A % of enterprises with strong password authentication (1);Total;78 Total Enterprises;J.1.A % of enterprises with strong password authentication (1);From 10 to 49;76,13 Total Enterprises;J.1.A % of enterprises with strong password authentication (1);From 50 to 249;85,6 Total Enterprises;J.1.A % of enterprises with strong password authentication (1);250 or more;95,08 Total Enterprises;J.1.B % of enterprises that maintain software updated (1);Total;96 Total Enterprises;J.1.B % of enterprises that maintain software updated (1);From 10 to 49;95,73 Total Enterprises;J.1.B % of enterprises that maintain software updated (1);From 50 to 249;97,1 Total Enterprises;J.1.B % of enterprises that maintain software updated (1);250 or more;98,43 Total Enterprises;J.1.C % of enterprises with biometric authentication (1);Total;26,95 Total Enterprises;J.1.C % of enterprises with biometric authentication (1);From 10 to 49;24,98 Total Enterprises;J.1.C % of enterprises with biometric authentication (1);From 50 to 249;35,51 Total Enterprises;J.1.C % of enterprises with biometric authentication (1);250 or more;42,08 Total Enterprises;J.1.D % of enterprises with encryption techniques (1);Total;38,85 Total Enterprises;J.1.D % of enterprises with encryption techniques (1);From 10 to 49;35,41 Total Enterprises;J.1.D % of enterprises with encryption techniques (1);From 50 to 249;52,34 Total Enterprises;J.1.D % of enterprises with encryption techniques (1);250 or more;72,55 Total Enterprises;J.1.E % of enterprises with data backup in a separate location (1);Total;91,07 Total Enterprises;J.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;90,19 Total Enterprises;J.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;95,07 Total Enterprises;J.1.E % of enterprises with data backup in a separate location (1);250 or more;96,85 Total Enterprises;J.1.F % of enterprises with control of network access (1);Total;76,1 Total Enterprises;J.1.F % of enterprises with control of network access (1);From 10 to 49;73,49 Total Enterprises;J.1.F % of enterprises with control of network access (1);From 50 to 249;88,1 Total Enterprises;J.1.F % of enterprises with control of network access (1);250 or more;92,82 Total Enterprises;J.1.G % of enterprises with a Virtual Private Network (1);Total;50,49 Total Enterprises;J.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;45,43 Total Enterprises;J.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;72,34 Total Enterprises;J.1.G % of enterprises with a Virtual Private Network (1);250 or more;89,93 Total Enterprises;J.1.H % of enterprises that maintain log files to analyze security incidents (1);Total;44,3 Total Enterprises;J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;39,75 Total Enterprises;J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;63,4 Total Enterprises;J.1.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;82,25 Total Enterprises;J.1.J % of enterprises with an ICT risk assessment (1);Total;32,31 Total Enterprises;J.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;27,79 Total Enterprises;J.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;50,92 Total Enterprises;J.1.J % of enterprises with an ICT risk assessment (1);250 or more;71,71 Total Enterprises;J.1.K % of enterprises with an ICT security test (1);Total;35,22 Total Enterprises;J.1.K % of enterprises with an ICT security test (1);From 10 to 49;31,17 Total Enterprises;J.1.K % of enterprises with an ICT security test (1);From 50 to 249;51,38 Total Enterprises;J.1.K % of enterprises with an ICT security test (1);250 or more;73 1. Total Industry (CNAE 10-39);J.1 % of enterprises that apply some ICT security measure;Total;92,12 1. Total Industry (CNAE 10-39);J.1 % of enterprises that apply some ICT security measure;From 10 to 49;90,97 1. Total Industry (CNAE 10-39);J.1 % of enterprises that apply some ICT security measure;From 50 to 249;96,65 1. Total Industry (CNAE 10-39);J.1 % of enterprises that apply some ICT security measure;250 or more;99,03 1. Total Industry (CNAE 10-39);J.1.A % of enterprises with strong password authentication (1);Total;75,77 1. Total Industry (CNAE 10-39);J.1.A % of enterprises with strong password authentication (1);From 10 to 49;73,09 1. Total Industry (CNAE 10-39);J.1.A % of enterprises with strong password authentication (1);From 50 to 249;84,4 1. Total Industry (CNAE 10-39);J.1.A % of enterprises with strong password authentication (1);250 or more;96,27 1. Total Industry (CNAE 10-39);J.1.B % of enterprises that maintain software updated (1);Total;95,83 1. Total Industry (CNAE 10-39);J.1.B % of enterprises that maintain software updated (1);From 10 to 49;95,34 1. Total Industry (CNAE 10-39);J.1.B % of enterprises that maintain software updated (1);From 50 to 249;97,63 1. Total Industry (CNAE 10-39);J.1.B % of enterprises that maintain software updated (1);250 or more;98,63 1. Total Industry (CNAE 10-39);J.1.C % of enterprises with biometric authentication (1);Total;28,85 1. Total Industry (CNAE 10-39);J.1.C % of enterprises with biometric authentication (1);From 10 to 49;26,16 1. Total Industry (CNAE 10-39);J.1.C % of enterprises with biometric authentication (1);From 50 to 249;38,86 1. Total Industry (CNAE 10-39);J.1.C % of enterprises with biometric authentication (1);250 or more;43,03 1. Total Industry (CNAE 10-39);J.1.D % of enterprises with encryption techniques (1);Total;34,02 1. Total Industry (CNAE 10-39);J.1.D % of enterprises with encryption techniques (1);From 10 to 49;29,07 1. Total Industry (CNAE 10-39);J.1.D % of enterprises with encryption techniques (1);From 50 to 249;49,65 1. Total Industry (CNAE 10-39);J.1.D % of enterprises with encryption techniques (1);250 or more;73,24 1. Total Industry (CNAE 10-39);J.1.E % of enterprises with data backup in a separate location (1);Total;91,04 1. Total Industry (CNAE 10-39);J.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;89,94 1. Total Industry (CNAE 10-39);J.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;95,14 1. Total Industry (CNAE 10-39);J.1.E % of enterprises with data backup in a separate location (1);250 or more;96,76 1. Total Industry (CNAE 10-39);J.1.F % of enterprises with control of network access (1);Total;74,87 1. Total Industry (CNAE 10-39);J.1.F % of enterprises with control of network access (1);From 10 to 49;70,77 1. Total Industry (CNAE 10-39);J.1.F % of enterprises with control of network access (1);From 50 to 249;90,58 1. Total Industry (CNAE 10-39);J.1.F % of enterprises with control of network access (1);250 or more;94,6 1. Total Industry (CNAE 10-39);J.1.G % of enterprises with a Virtual Private Network (1);Total;48,82 1. Total Industry (CNAE 10-39);J.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;40,86 1. Total Industry (CNAE 10-39);J.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;77,62 1. Total Industry (CNAE 10-39);J.1.G % of enterprises with a Virtual Private Network (1);250 or more;94,99 1. Total Industry (CNAE 10-39);J.1.H % of enterprises that maintain log files to analyze security incidents (1);Total;40,29 1. Total Industry (CNAE 10-39);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;33,4 1. Total Industry (CNAE 10-39);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;64,02 1. Total Industry (CNAE 10-39);J.1.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;85,86 1. Total Industry (CNAE 10-39);J.1.J % of enterprises with an ICT risk assessment (1);Total;29,92 1. Total Industry (CNAE 10-39);J.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;23,22 1. Total Industry (CNAE 10-39);J.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;52,55 1. Total Industry (CNAE 10-39);J.1.J % of enterprises with an ICT risk assessment (1);250 or more;76,45 1. Total Industry (CNAE 10-39);J.1.K % of enterprises with an ICT security test (1);Total;31,9 1. Total Industry (CNAE 10-39);J.1.K % of enterprises with an ICT security test (1);From 10 to 49;25,44 1. Total Industry (CNAE 10-39);J.1.K % of enterprises with an ICT security test (1);From 50 to 249;53,72 1. Total Industry (CNAE 10-39);J.1.K % of enterprises with an ICT security test (1);250 or more;76,56 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1 % of enterprises that apply some ICT security measure;Total;90,35 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1 % of enterprises that apply some ICT security measure;From 10 to 49;89,38 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1 % of enterprises that apply some ICT security measure;From 50 to 249;95,03 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1 % of enterprises that apply some ICT security measure;250 or more;97,24 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.A % of enterprises with strong password authentication (1);Total;70,95 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.A % of enterprises with strong password authentication (1);From 10 to 49;68,49 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.A % of enterprises with strong password authentication (1);From 50 to 249;80,79 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.A % of enterprises with strong password authentication (1);250 or more;94,33 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.B % of enterprises that maintain software updated (1);Total;96,45 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.B % of enterprises that maintain software updated (1);From 10 to 49;95,9 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.B % of enterprises that maintain software updated (1);From 50 to 249;99,3 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.B % of enterprises that maintain software updated (1);250 or more;98,18 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.C % of enterprises with biometric authentication (1);Total;27,38 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.C % of enterprises with biometric authentication (1);From 10 to 49;24,97 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.C % of enterprises with biometric authentication (1);From 50 to 249;38,08 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.C % of enterprises with biometric authentication (1);250 or more;44,38 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.D % of enterprises with encryption techniques (1);Total;26,02 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.D % of enterprises with encryption techniques (1);From 10 to 49;21,46 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.D % of enterprises with encryption techniques (1);From 50 to 249;44,58 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.D % of enterprises with encryption techniques (1);250 or more;67,41 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.E % of enterprises with data backup in a separate location (1);Total;88,72 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;87,47 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;94,96 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.E % of enterprises with data backup in a separate location (1);250 or more;93,75 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.F % of enterprises with control of network access (1);Total;70,58 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.F % of enterprises with control of network access (1);From 10 to 49;66,41 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.F % of enterprises with control of network access (1);From 50 to 249;90,11 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.F % of enterprises with control of network access (1);250 or more;94,73 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.G % of enterprises with a Virtual Private Network (1);Total;42,4 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;36,57 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;66,34 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.G % of enterprises with a Virtual Private Network (1);250 or more;94,53 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.H % of enterprises that maintain log files to analyze security incidents (1);Total;35,18 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;29,33 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;60,41 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;80,64 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.J % of enterprises with an ICT risk assessment (1);Total;27,63 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;22,53 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;48,58 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.J % of enterprises with an ICT risk assessment (1);250 or more;72,94 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.K % of enterprises with an ICT security test (1);Total;28,09 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.K % of enterprises with an ICT security test (1);From 10 to 49;23,16 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.K % of enterprises with an ICT security test (1);From 50 to 249;48,16 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);J.1.K % of enterprises with an ICT security test (1);250 or more;72,76 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1 % of enterprises that apply some ICT security measure;Total;95,6 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1 % of enterprises that apply some ICT security measure;From 10 to 49;94,32 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1 % of enterprises that apply some ICT security measure;From 50 to 249;99,36 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1 % of enterprises that apply some ICT security measure;250 or more;100 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.A % of enterprises with strong password authentication (1);Total;77,98 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.A % of enterprises with strong password authentication (1);From 10 to 49;73,56 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.A % of enterprises with strong password authentication (1);From 50 to 249;88,89 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.A % of enterprises with strong password authentication (1);250 or more;97,37 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.B % of enterprises that maintain software updated (1);Total;96 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.B % of enterprises that maintain software updated (1);From 10 to 49;95,55 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.B % of enterprises that maintain software updated (1);From 50 to 249;97,09 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.B % of enterprises that maintain software updated (1);250 or more;97,96 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.C % of enterprises with biometric authentication (1);Total;31,94 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.C % of enterprises with biometric authentication (1);From 10 to 49;27,42 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.C % of enterprises with biometric authentication (1);From 50 to 249;44,13 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.C % of enterprises with biometric authentication (1);250 or more;47,88 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.D % of enterprises with encryption techniques (1);Total;41,7 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.D % of enterprises with encryption techniques (1);From 10 to 49;35,67 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.D % of enterprises with encryption techniques (1);From 50 to 249;54,03 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.D % of enterprises with encryption techniques (1);250 or more;77,36 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.E % of enterprises with data backup in a separate location (1);Total;94,15 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;93,17 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;96,3 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.E % of enterprises with data backup in a separate location (1);250 or more;99,41 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.F % of enterprises with control of network access (1);Total;82,45 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.F % of enterprises with control of network access (1);From 10 to 49;78,75 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.F % of enterprises with control of network access (1);From 50 to 249;92,45 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.F % of enterprises with control of network access (1);250 or more;95,54 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.G % of enterprises with a Virtual Private Network (1);Total;59,81 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;50,81 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;83,08 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.G % of enterprises with a Virtual Private Network (1);250 or more;95,32 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.H % of enterprises that maintain log files to analyze security incidents (1);Total;50,37 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;42,52 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;68,13 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;90,57 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.J % of enterprises with an ICT risk assessment (1);Total;35,81 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;27,1 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;56,39 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.J % of enterprises with an ICT risk assessment (1);250 or more;77,27 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.K % of enterprises with an ICT security test (1);Total;40,85 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.K % of enterprises with an ICT security test (1);From 10 to 49;32,09 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.K % of enterprises with an ICT security test (1);From 50 to 249;61,25 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);J.1.K % of enterprises with an ICT security test (1);250 or more;83,53 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1 % of enterprises that apply some ICT security measure;Total;92,03 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1 % of enterprises that apply some ICT security measure;From 10 to 49;90,67 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1 % of enterprises that apply some ICT security measure;From 50 to 249;99,61 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1 % of enterprises that apply some ICT security measure;250 or more;100 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.A % of enterprises with strong password authentication (1);Total;81,9 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.A % of enterprises with strong password authentication (1);From 10 to 49;81,1 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.A % of enterprises with strong password authentication (1);From 50 to 249;85,09 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.A % of enterprises with strong password authentication (1);250 or more;92,84 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.B % of enterprises that maintain software updated (1);Total;95,86 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.B % of enterprises that maintain software updated (1);From 10 to 49;95,27 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.B % of enterprises that maintain software updated (1);From 50 to 249;98,7 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.B % of enterprises that maintain software updated (1);250 or more;100 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.C % of enterprises with biometric authentication (1);Total;34,01 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.C % of enterprises with biometric authentication (1);From 10 to 49;33,31 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.C % of enterprises with biometric authentication (1);From 50 to 249;37,47 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.C % of enterprises with biometric authentication (1);250 or more;37,99 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.D % of enterprises with encryption techniques (1);Total;36,25 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.D % of enterprises with encryption techniques (1);From 10 to 49;34,07 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.D % of enterprises with encryption techniques (1);From 50 to 249;44,68 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.D % of enterprises with encryption techniques (1);250 or more;66,8 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.E % of enterprises with data backup in a separate location (1);Total;92,33 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;92,19 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;92,63 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.E % of enterprises with data backup in a separate location (1);250 or more;95,74 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.F % of enterprises with control of network access (1);Total;73,3 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.F % of enterprises with control of network access (1);From 10 to 49;70,48 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.F % of enterprises with control of network access (1);From 50 to 249;86,87 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.F % of enterprises with control of network access (1);250 or more;93,74 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.G % of enterprises with a Virtual Private Network (1);Total;42,25 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;35,07 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;77,39 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.G % of enterprises with a Virtual Private Network (1);250 or more;89,91 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.H % of enterprises that maintain log files to analyze security incidents (1);Total;38,31 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;33,58 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;60,05 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;79,89 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.J % of enterprises with an ICT risk assessment (1);Total;27,71 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;22,2 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;52,66 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.J % of enterprises with an ICT risk assessment (1);250 or more;78,93 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.K % of enterprises with an ICT security test (1);Total;30,58 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.K % of enterprises with an ICT security test (1);From 10 to 49;25,43 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.K % of enterprises with an ICT security test (1);From 50 to 249;54,05 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);J.1.K % of enterprises with an ICT security test (1);250 or more;77,53 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1 % of enterprises that apply some ICT security measure;Total;91,99 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1 % of enterprises that apply some ICT security measure;From 10 to 49;90,9 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1 % of enterprises that apply some ICT security measure;From 50 to 249;95,33 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1 % of enterprises that apply some ICT security measure;250 or more;100 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.A % of enterprises with strong password authentication (1);Total;75,71 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.A % of enterprises with strong password authentication (1);From 10 to 49;72,73 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.A % of enterprises with strong password authentication (1);From 50 to 249;83,96 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.A % of enterprises with strong password authentication (1);250 or more;97,44 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.B % of enterprises that maintain software updated (1);Total;94,44 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.B % of enterprises that maintain software updated (1);From 10 to 49;93,91 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.B % of enterprises that maintain software updated (1);From 50 to 249;95,82 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.B % of enterprises that maintain software updated (1);250 or more;98,63 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.C % of enterprises with biometric authentication (1);Total;25,52 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.C % of enterprises with biometric authentication (1);From 10 to 49;21,87 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.C % of enterprises with biometric authentication (1);From 50 to 249;38,43 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.C % of enterprises with biometric authentication (1);250 or more;38,97 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.D % of enterprises with encryption techniques (1);Total;37,41 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.D % of enterprises with encryption techniques (1);From 10 to 49;31,62 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.D % of enterprises with encryption techniques (1);From 50 to 249;54,46 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.D % of enterprises with encryption techniques (1);250 or more;74,85 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.E % of enterprises with data backup in a separate location (1);Total;91,13 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;89,63 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;96,21 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.E % of enterprises with data backup in a separate location (1);250 or more;97,89 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.F % of enterprises with control of network access (1);Total;76,03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.F % of enterprises with control of network access (1);From 10 to 49;71,62 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.F % of enterprises with control of network access (1);From 50 to 249;91,52 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.F % of enterprises with control of network access (1);250 or more;92,99 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.G % of enterprises with a Virtual Private Network (1);Total;53,15 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;43,15 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;87,16 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.G % of enterprises with a Virtual Private Network (1);250 or more;96,72 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.H % of enterprises that maintain log files to analyze security incidents (1);Total;39,88 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;31,05 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;67,5 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;89,57 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.J % of enterprises with an ICT risk assessment (1);Total;29,56 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;21,33 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;54,54 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.J % of enterprises with an ICT risk assessment (1);250 or more;79,52 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.K % of enterprises with an ICT security test (1);Total;31,3 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.K % of enterprises with an ICT security test (1);From 10 to 49;23,45 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.K % of enterprises with an ICT security test (1);From 50 to 249;55,59 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);J.1.K % of enterprises with an ICT security test (1);250 or more;76,65 1.5. Energy and water (CNAE 35-39);J.1 % of enterprises that apply some ICT security measure;Total;96,14 1.5. Energy and water (CNAE 35-39);J.1 % of enterprises that apply some ICT security measure;From 10 to 49;95,97 1.5. Energy and water (CNAE 35-39);J.1 % of enterprises that apply some ICT security measure;From 50 to 249;95,94 1.5. Energy and water (CNAE 35-39);J.1 % of enterprises that apply some ICT security measure;250 or more;98,57 1.5. Energy and water (CNAE 35-39);J.1.A % of enterprises with strong password authentication (1);Total;82,9 1.5. Energy and water (CNAE 35-39);J.1.A % of enterprises with strong password authentication (1);From 10 to 49;79,52 1.5. Energy and water (CNAE 35-39);J.1.A % of enterprises with strong password authentication (1);From 50 to 249;89,54 1.5. Energy and water (CNAE 35-39);J.1.A % of enterprises with strong password authentication (1);250 or more;99,11 1.5. Energy and water (CNAE 35-39);J.1.B % of enterprises that maintain software updated (1);Total;96,97 1.5. Energy and water (CNAE 35-39);J.1.B % of enterprises that maintain software updated (1);From 10 to 49;97,08 1.5. Energy and water (CNAE 35-39);J.1.B % of enterprises that maintain software updated (1);From 50 to 249;95,52 1.5. Energy and water (CNAE 35-39);J.1.B % of enterprises that maintain software updated (1);250 or more;100 1.5. Energy and water (CNAE 35-39);J.1.C % of enterprises with biometric authentication (1);Total;28,05 1.5. Energy and water (CNAE 35-39);J.1.C % of enterprises with biometric authentication (1);From 10 to 49;25,23 1.5. Energy and water (CNAE 35-39);J.1.C % of enterprises with biometric authentication (1);From 50 to 249;33,08 1.5. Energy and water (CNAE 35-39);J.1.C % of enterprises with biometric authentication (1);250 or more;42,95 1.5. Energy and water (CNAE 35-39);J.1.D % of enterprises with encryption techniques (1);Total;45,51 1.5. Energy and water (CNAE 35-39);J.1.D % of enterprises with encryption techniques (1);From 10 to 49;39,44 1.5. Energy and water (CNAE 35-39);J.1.D % of enterprises with encryption techniques (1);From 50 to 249;55,2 1.5. Energy and water (CNAE 35-39);J.1.D % of enterprises with encryption techniques (1);250 or more;81,07 1.5. Energy and water (CNAE 35-39);J.1.E % of enterprises with data backup in a separate location (1);Total;93,72 1.5. Energy and water (CNAE 35-39);J.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;93,17 1.5. Energy and water (CNAE 35-39);J.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;94,54 1.5. Energy and water (CNAE 35-39);J.1.E % of enterprises with data backup in a separate location (1);250 or more;97,04 1.5. Energy and water (CNAE 35-39);J.1.F % of enterprises with control of network access (1);Total;83,08 1.5. Energy and water (CNAE 35-39);J.1.F % of enterprises with control of network access (1);From 10 to 49;79,19 1.5. Energy and water (CNAE 35-39);J.1.F % of enterprises with control of network access (1);From 50 to 249;92,47 1.5. Energy and water (CNAE 35-39);J.1.F % of enterprises with control of network access (1);250 or more;96,7 1.5. Energy and water (CNAE 35-39);J.1.G % of enterprises with a Virtual Private Network (1);Total;64,34 1.5. Energy and water (CNAE 35-39);J.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;56,49 1.5. Energy and water (CNAE 35-39);J.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;81,85 1.5. Energy and water (CNAE 35-39);J.1.G % of enterprises with a Virtual Private Network (1);250 or more;95,95 1.5. Energy and water (CNAE 35-39);J.1.H % of enterprises that maintain log files to analyze security incidents (1);Total;54,96 1.5. Energy and water (CNAE 35-39);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;48,94 1.5. Energy and water (CNAE 35-39);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;66,09 1.5. Energy and water (CNAE 35-39);J.1.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;85,81 1.5. Energy and water (CNAE 35-39);J.1.J % of enterprises with an ICT risk assessment (1);Total;37,7 1.5. Energy and water (CNAE 35-39);J.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;29,83 1.5. Energy and water (CNAE 35-39);J.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;53,48 1.5. Energy and water (CNAE 35-39);J.1.J % of enterprises with an ICT risk assessment (1);250 or more;74,47 1.5. Energy and water (CNAE 35-39);J.1.K % of enterprises with an ICT security test (1);Total;39,77 1.5. Energy and water (CNAE 35-39);J.1.K % of enterprises with an ICT security test (1);From 10 to 49;33,4 1.5. Energy and water (CNAE 35-39);J.1.K % of enterprises with an ICT security test (1);From 50 to 249;52,25 1.5. Energy and water (CNAE 35-39);J.1.K % of enterprises with an ICT security test (1);250 or more;70,37 2. Total Construction (CNAE 41-43);J.1 % of enterprises that apply some ICT security measure;Total;87,83 2. Total Construction (CNAE 41-43);J.1 % of enterprises that apply some ICT security measure;From 10 to 49;87,26 2. Total Construction (CNAE 41-43);J.1 % of enterprises that apply some ICT security measure;From 50 to 249;93,01 2. Total Construction (CNAE 41-43);J.1 % of enterprises that apply some ICT security measure;250 or more;100 2. Total Construction (CNAE 41-43);J.1.A % of enterprises with strong password authentication (1);Total;76,56 2. Total Construction (CNAE 41-43);J.1.A % of enterprises with strong password authentication (1);From 10 to 49;76,09 2. Total Construction (CNAE 41-43);J.1.A % of enterprises with strong password authentication (1);From 50 to 249;79,97 2. Total Construction (CNAE 41-43);J.1.A % of enterprises with strong password authentication (1);250 or more;93,63 2. Total Construction (CNAE 41-43);J.1.B % of enterprises that maintain software updated (1);Total;95,47 2. Total Construction (CNAE 41-43);J.1.B % of enterprises that maintain software updated (1);From 10 to 49;95,5 2. Total Construction (CNAE 41-43);J.1.B % of enterprises that maintain software updated (1);From 50 to 249;95,02 2. Total Construction (CNAE 41-43);J.1.B % of enterprises that maintain software updated (1);250 or more;97,63 2. Total Construction (CNAE 41-43);J.1.C % of enterprises with biometric authentication (1);Total;16,74 2. Total Construction (CNAE 41-43);J.1.C % of enterprises with biometric authentication (1);From 10 to 49;15,8 2. Total Construction (CNAE 41-43);J.1.C % of enterprises with biometric authentication (1);From 50 to 249;24,34 2. Total Construction (CNAE 41-43);J.1.C % of enterprises with biometric authentication (1);250 or more;42,06 2. Total Construction (CNAE 41-43);J.1.D % of enterprises with encryption techniques (1);Total;28,23 2. Total Construction (CNAE 41-43);J.1.D % of enterprises with encryption techniques (1);From 10 to 49;27,1 2. Total Construction (CNAE 41-43);J.1.D % of enterprises with encryption techniques (1);From 50 to 249;35,9 2. Total Construction (CNAE 41-43);J.1.D % of enterprises with encryption techniques (1);250 or more;77,92 2. Total Construction (CNAE 41-43);J.1.E % of enterprises with data backup in a separate location (1);Total;87,47 2. Total Construction (CNAE 41-43);J.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;86,82 2. Total Construction (CNAE 41-43);J.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;93,32 2. Total Construction (CNAE 41-43);J.1.E % of enterprises with data backup in a separate location (1);250 or more;95,65 2. Total Construction (CNAE 41-43);J.1.F % of enterprises with control of network access (1);Total;69,27 2. Total Construction (CNAE 41-43);J.1.F % of enterprises with control of network access (1);From 10 to 49;67,81 2. Total Construction (CNAE 41-43);J.1.F % of enterprises with control of network access (1);From 50 to 249;82,11 2. Total Construction (CNAE 41-43);J.1.F % of enterprises with control of network access (1);250 or more;93,8 2. Total Construction (CNAE 41-43);J.1.G % of enterprises with a Virtual Private Network (1);Total;35,03 2. Total Construction (CNAE 41-43);J.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;32,62 2. Total Construction (CNAE 41-43);J.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;54,64 2. Total Construction (CNAE 41-43);J.1.G % of enterprises with a Virtual Private Network (1);250 or more;97,5 2. Total Construction (CNAE 41-43);J.1.H % of enterprises that maintain log files to analyze security incidents (1);Total;27,14 2. Total Construction (CNAE 41-43);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;24,67 2. Total Construction (CNAE 41-43);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;47,9 2. Total Construction (CNAE 41-43);J.1.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;81,23 2. Total Construction (CNAE 41-43);J.1.J % of enterprises with an ICT risk assessment (1);Total;15,45 2. Total Construction (CNAE 41-43);J.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;13,35 2. Total Construction (CNAE 41-43);J.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;32,88 2. Total Construction (CNAE 41-43);J.1.J % of enterprises with an ICT risk assessment (1);250 or more;65,46 2. Total Construction (CNAE 41-43);J.1.K % of enterprises with an ICT security test (1);Total;21,7 2. Total Construction (CNAE 41-43);J.1.K % of enterprises with an ICT security test (1);From 10 to 49;20,13 2. Total Construction (CNAE 41-43);J.1.K % of enterprises with an ICT security test (1);From 50 to 249;33,84 2. Total Construction (CNAE 41-43);J.1.K % of enterprises with an ICT security test (1);250 or more;69,91 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1 % of enterprises that apply some ICT security measure;Total;92,95 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1 % of enterprises that apply some ICT security measure;From 10 to 49;92,2 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1 % of enterprises that apply some ICT security measure;From 50 to 249;96,25 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1 % of enterprises that apply some ICT security measure;250 or more;98,94 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.A % of enterprises with strong password authentication (1);Total;79,29 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.A % of enterprises with strong password authentication (1);From 10 to 49;77,38 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.A % of enterprises with strong password authentication (1);From 50 to 249;87,02 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.A % of enterprises with strong password authentication (1);250 or more;94,59 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.B % of enterprises that maintain software updated (1);Total;96,2 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.B % of enterprises that maintain software updated (1);From 10 to 49;95,95 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.B % of enterprises that maintain software updated (1);From 50 to 249;97,15 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.B % of enterprises that maintain software updated (1);250 or more;98,37 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.C % of enterprises with biometric authentication (1);Total;28,54 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.C % of enterprises with biometric authentication (1);From 10 to 49;26,85 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.C % of enterprises with biometric authentication (1);From 50 to 249;35,51 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.C % of enterprises with biometric authentication (1);250 or more;41,63 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.D % of enterprises with encryption techniques (1);Total;43,38 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.D % of enterprises with encryption techniques (1);From 10 to 49;40,12 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.D % of enterprises with encryption techniques (1);From 50 to 249;56,09 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.D % of enterprises with encryption techniques (1);250 or more;71,94 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.E % of enterprises with data backup in a separate location (1);Total;91,92 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;91,15 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;95,29 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.E % of enterprises with data backup in a separate location (1);250 or more;96,95 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.F % of enterprises with control of network access (1);Total;78,22 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.F % of enterprises with control of network access (1);From 10 to 49;76,06 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.F % of enterprises with control of network access (1);From 50 to 249;87,78 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.F % of enterprises with control of network access (1);250 or more;91,93 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.G % of enterprises with a Virtual Private Network (1);Total;54,81 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;50,58 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;72,35 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.G % of enterprises with a Virtual Private Network (1);250 or more;87,15 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.H % of enterprises that maintain log files to analyze security incidents (1);Total;50,01 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;46,21 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;65,38 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;80,6 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.J % of enterprises with an ICT risk assessment (1);Total;37,26 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;33,36 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;52,79 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.J % of enterprises with an ICT risk assessment (1);250 or more;69,8 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.K % of enterprises with an ICT security test (1);Total;39,78 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.K % of enterprises with an ICT security test (1);From 10 to 49;36,34 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.K % of enterprises with an ICT security test (1);From 50 to 249;52,83 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);J.1.K % of enterprises with an ICT security test (1);250 or more;71,48 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1 % of enterprises that apply some ICT security measure;Total;92,42 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1 % of enterprises that apply some ICT security measure;From 10 to 49;91,66 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1 % of enterprises that apply some ICT security measure;From 50 to 249;96,99 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1 % of enterprises that apply some ICT security measure;250 or more;98,92 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.A % of enterprises with strong password authentication (1);Total;76,61 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.A % of enterprises with strong password authentication (1);From 10 to 49;74,96 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.A % of enterprises with strong password authentication (1);From 50 to 249;85,45 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.A % of enterprises with strong password authentication (1);250 or more;92,42 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.B % of enterprises that maintain software updated (1);Total;95,94 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.B % of enterprises that maintain software updated (1);From 10 to 49;95,72 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.B % of enterprises that maintain software updated (1);From 50 to 249;97,18 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.B % of enterprises that maintain software updated (1);250 or more;97,96 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.C % of enterprises with biometric authentication (1);Total;26,15 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.C % of enterprises with biometric authentication (1);From 10 to 49;24,14 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.C % of enterprises with biometric authentication (1);From 50 to 249;37,53 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.C % of enterprises with biometric authentication (1);250 or more;41,89 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.D % of enterprises with encryption techniques (1);Total;38,72 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.D % of enterprises with encryption techniques (1);From 10 to 49;35,55 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.D % of enterprises with encryption techniques (1);From 50 to 249;55,53 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.D % of enterprises with encryption techniques (1);250 or more;70,04 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.E % of enterprises with data backup in a separate location (1);Total;92,38 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;91,66 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;96,73 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.E % of enterprises with data backup in a separate location (1);250 or more;96,61 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.F % of enterprises with control of network access (1);Total;80,31 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.F % of enterprises with control of network access (1);From 10 to 49;78,73 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.F % of enterprises with control of network access (1);From 50 to 249;88,97 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.F % of enterprises with control of network access (1);250 or more;94,56 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.G % of enterprises with a Virtual Private Network (1);Total;54,26 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;50,73 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;73,17 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.G % of enterprises with a Virtual Private Network (1);250 or more;88,04 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.H % of enterprises that maintain log files to analyze security incidents (1);Total;46,73 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;43,49 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;63,57 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;80,69 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.J % of enterprises with an ICT risk assessment (1);Total;33,66 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;30,7 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;48,82 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.J % of enterprises with an ICT risk assessment (1);250 or more;65,8 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.K % of enterprises with an ICT security test (1);Total;37,35 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.K % of enterprises with an ICT security test (1);From 10 to 49;34,93 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.K % of enterprises with an ICT security test (1);From 50 to 249;49,03 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);J.1.K % of enterprises with an ICT security test (1);250 or more;67,69 3.2. Transport and storage (CNAE 49-53);J.1 % of enterprises that apply some ICT security measure;Total;90,67 3.2. Transport and storage (CNAE 49-53);J.1 % of enterprises that apply some ICT security measure;From 10 to 49;89,54 3.2. Transport and storage (CNAE 49-53);J.1 % of enterprises that apply some ICT security measure;From 50 to 249;95,7 3.2. Transport and storage (CNAE 49-53);J.1 % of enterprises that apply some ICT security measure;250 or more;99,08 3.2. Transport and storage (CNAE 49-53);J.1.A % of enterprises with strong password authentication (1);Total;75,73 3.2. Transport and storage (CNAE 49-53);J.1.A % of enterprises with strong password authentication (1);From 10 to 49;73,46 3.2. Transport and storage (CNAE 49-53);J.1.A % of enterprises with strong password authentication (1);From 50 to 249;84,71 3.2. Transport and storage (CNAE 49-53);J.1.A % of enterprises with strong password authentication (1);250 or more;93,68 3.2. Transport and storage (CNAE 49-53);J.1.B % of enterprises that maintain software updated (1);Total;95,25 3.2. Transport and storage (CNAE 49-53);J.1.B % of enterprises that maintain software updated (1);From 10 to 49;95,11 3.2. Transport and storage (CNAE 49-53);J.1.B % of enterprises that maintain software updated (1);From 50 to 249;96,05 3.2. Transport and storage (CNAE 49-53);J.1.B % of enterprises that maintain software updated (1);250 or more;95,17 3.2. Transport and storage (CNAE 49-53);J.1.C % of enterprises with biometric authentication (1);Total;23,36 3.2. Transport and storage (CNAE 49-53);J.1.C % of enterprises with biometric authentication (1);From 10 to 49;22,1 3.2. Transport and storage (CNAE 49-53);J.1.C % of enterprises with biometric authentication (1);From 50 to 249;27,46 3.2. Transport and storage (CNAE 49-53);J.1.C % of enterprises with biometric authentication (1);250 or more;37,56 3.2. Transport and storage (CNAE 49-53);J.1.D % of enterprises with encryption techniques (1);Total;33,68 3.2. Transport and storage (CNAE 49-53);J.1.D % of enterprises with encryption techniques (1);From 10 to 49;30,02 3.2. Transport and storage (CNAE 49-53);J.1.D % of enterprises with encryption techniques (1);From 50 to 249;47,62 3.2. Transport and storage (CNAE 49-53);J.1.D % of enterprises with encryption techniques (1);250 or more;65,23 3.2. Transport and storage (CNAE 49-53);J.1.E % of enterprises with data backup in a separate location (1);Total;88,34 3.2. Transport and storage (CNAE 49-53);J.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;86,81 3.2. Transport and storage (CNAE 49-53);J.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;95,28 3.2. Transport and storage (CNAE 49-53);J.1.E % of enterprises with data backup in a separate location (1);250 or more;96,23 3.2. Transport and storage (CNAE 49-53);J.1.F % of enterprises with control of network access (1);Total;69,61 3.2. Transport and storage (CNAE 49-53);J.1.F % of enterprises with control of network access (1);From 10 to 49;65,51 3.2. Transport and storage (CNAE 49-53);J.1.F % of enterprises with control of network access (1);From 50 to 249;88,17 3.2. Transport and storage (CNAE 49-53);J.1.F % of enterprises with control of network access (1);250 or more;90,66 3.2. Transport and storage (CNAE 49-53);J.1.G % of enterprises with a Virtual Private Network (1);Total;42,3 3.2. Transport and storage (CNAE 49-53);J.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;35,95 3.2. Transport and storage (CNAE 49-53);J.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;68,22 3.2. Transport and storage (CNAE 49-53);J.1.G % of enterprises with a Virtual Private Network (1);250 or more;88,87 3.2. Transport and storage (CNAE 49-53);J.1.H % of enterprises that maintain log files to analyze security incidents (1);Total;39,3 3.2. Transport and storage (CNAE 49-53);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;33,68 3.2. Transport and storage (CNAE 49-53);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;62,08 3.2. Transport and storage (CNAE 49-53);J.1.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;81,29 3.2. Transport and storage (CNAE 49-53);J.1.J % of enterprises with an ICT risk assessment (1);Total;22,31 3.2. Transport and storage (CNAE 49-53);J.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;16,37 3.2. Transport and storage (CNAE 49-53);J.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;45,77 3.2. Transport and storage (CNAE 49-53);J.1.J % of enterprises with an ICT risk assessment (1);250 or more;69,67 3.2. Transport and storage (CNAE 49-53);J.1.K % of enterprises with an ICT security test (1);Total;27,49 3.2. Transport and storage (CNAE 49-53);J.1.K % of enterprises with an ICT security test (1);From 10 to 49;22,29 3.2. Transport and storage (CNAE 49-53);J.1.K % of enterprises with an ICT security test (1);From 50 to 249;47,4 3.2. Transport and storage (CNAE 49-53);J.1.K % of enterprises with an ICT security test (1);250 or more;72,15 3.3. Accommodation services (CNAE 55);J.1 % of enterprises that apply some ICT security measure;Total;96,5 3.3. Accommodation services (CNAE 55);J.1 % of enterprises that apply some ICT security measure;From 10 to 49;95,76 3.3. Accommodation services (CNAE 55);J.1 % of enterprises that apply some ICT security measure;From 50 to 249;99,69 3.3. Accommodation services (CNAE 55);J.1 % of enterprises that apply some ICT security measure;250 or more;100 3.3. Accommodation services (CNAE 55);J.1.A % of enterprises with strong password authentication (1);Total;79,74 3.3. Accommodation services (CNAE 55);J.1.A % of enterprises with strong password authentication (1);From 10 to 49;79,3 3.3. Accommodation services (CNAE 55);J.1.A % of enterprises with strong password authentication (1);From 50 to 249;79,46 3.3. Accommodation services (CNAE 55);J.1.A % of enterprises with strong password authentication (1);250 or more;96,74 3.3. Accommodation services (CNAE 55);J.1.B % of enterprises that maintain software updated (1);Total;98,32 3.3. Accommodation services (CNAE 55);J.1.B % of enterprises that maintain software updated (1);From 10 to 49;97,92 3.3. Accommodation services (CNAE 55);J.1.B % of enterprises that maintain software updated (1);From 50 to 249;100 3.3. Accommodation services (CNAE 55);J.1.B % of enterprises that maintain software updated (1);250 or more;100 3.3. Accommodation services (CNAE 55);J.1.C % of enterprises with biometric authentication (1);Total;29,64 3.3. Accommodation services (CNAE 55);J.1.C % of enterprises with biometric authentication (1);From 10 to 49;25,67 3.3. Accommodation services (CNAE 55);J.1.C % of enterprises with biometric authentication (1);From 50 to 249;45,39 3.3. Accommodation services (CNAE 55);J.1.C % of enterprises with biometric authentication (1);250 or more;52,46 3.3. Accommodation services (CNAE 55);J.1.D % of enterprises with encryption techniques (1);Total;38,73 3.3. Accommodation services (CNAE 55);J.1.D % of enterprises with encryption techniques (1);From 10 to 49;34,66 3.3. Accommodation services (CNAE 55);J.1.D % of enterprises with encryption techniques (1);From 50 to 249;53,23 3.3. Accommodation services (CNAE 55);J.1.D % of enterprises with encryption techniques (1);250 or more;74,47 3.3. Accommodation services (CNAE 55);J.1.E % of enterprises with data backup in a separate location (1);Total;92,22 3.3. Accommodation services (CNAE 55);J.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;92,36 3.3. Accommodation services (CNAE 55);J.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;92 3.3. Accommodation services (CNAE 55);J.1.E % of enterprises with data backup in a separate location (1);250 or more;89,05 3.3. Accommodation services (CNAE 55);J.1.F % of enterprises with control of network access (1);Total;76,55 3.3. Accommodation services (CNAE 55);J.1.F % of enterprises with control of network access (1);From 10 to 49;73,02 3.3. Accommodation services (CNAE 55);J.1.F % of enterprises with control of network access (1);From 50 to 249;90,95 3.3. Accommodation services (CNAE 55);J.1.F % of enterprises with control of network access (1);250 or more;94,17 3.3. Accommodation services (CNAE 55);J.1.G % of enterprises with a Virtual Private Network (1);Total;52,5 3.3. Accommodation services (CNAE 55);J.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;47,54 3.3. Accommodation services (CNAE 55);J.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;70,55 3.3. Accommodation services (CNAE 55);J.1.G % of enterprises with a Virtual Private Network (1);250 or more;93,1 3.3. Accommodation services (CNAE 55);J.1.H % of enterprises that maintain log files to analyze security incidents (1);Total;47,55 3.3. Accommodation services (CNAE 55);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;44,16 3.3. Accommodation services (CNAE 55);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;58,72 3.3. Accommodation services (CNAE 55);J.1.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;83,68 3.3. Accommodation services (CNAE 55);J.1.J % of enterprises with an ICT risk assessment (1);Total;33,58 3.3. Accommodation services (CNAE 55);J.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;29,35 3.3. Accommodation services (CNAE 55);J.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;47,89 3.3. Accommodation services (CNAE 55);J.1.J % of enterprises with an ICT risk assessment (1);250 or more;75,95 3.3. Accommodation services (CNAE 55);J.1.K % of enterprises with an ICT security test (1);Total;36,78 3.3. Accommodation services (CNAE 55);J.1.K % of enterprises with an ICT security test (1);From 10 to 49;32,85 3.3. Accommodation services (CNAE 55);J.1.K % of enterprises with an ICT security test (1);From 50 to 249;49,46 3.3. Accommodation services (CNAE 55);J.1.K % of enterprises with an ICT security test (1);250 or more;80,65 3.4. Information and communications (CNAE 58-63);J.1 % of enterprises that apply some ICT security measure;Total;98,66 3.4. Information and communications (CNAE 58-63);J.1 % of enterprises that apply some ICT security measure;From 10 to 49;98,91 3.4. Information and communications (CNAE 58-63);J.1 % of enterprises that apply some ICT security measure;From 50 to 249;97,28 3.4. Information and communications (CNAE 58-63);J.1 % of enterprises that apply some ICT security measure;250 or more;100 3.4. Information and communications (CNAE 58-63);J.1.A % of enterprises with strong password authentication (1);Total;94,55 3.4. Information and communications (CNAE 58-63);J.1.A % of enterprises with strong password authentication (1);From 10 to 49;93,66 3.4. Information and communications (CNAE 58-63);J.1.A % of enterprises with strong password authentication (1);From 50 to 249;97,8 3.4. Information and communications (CNAE 58-63);J.1.A % of enterprises with strong password authentication (1);250 or more;96,92 3.4. Information and communications (CNAE 58-63);J.1.B % of enterprises that maintain software updated (1);Total;98,79 3.4. Information and communications (CNAE 58-63);J.1.B % of enterprises that maintain software updated (1);From 10 to 49;98,54 3.4. Information and communications (CNAE 58-63);J.1.B % of enterprises that maintain software updated (1);From 50 to 249;99,8 3.4. Information and communications (CNAE 58-63);J.1.B % of enterprises that maintain software updated (1);250 or more;99,15 3.4. Information and communications (CNAE 58-63);J.1.C % of enterprises with biometric authentication (1);Total;39,98 3.4. Information and communications (CNAE 58-63);J.1.C % of enterprises with biometric authentication (1);From 10 to 49;37,97 3.4. Information and communications (CNAE 58-63);J.1.C % of enterprises with biometric authentication (1);From 50 to 249;46,12 3.4. Information and communications (CNAE 58-63);J.1.C % of enterprises with biometric authentication (1);250 or more;50,18 3.4. Information and communications (CNAE 58-63);J.1.D % of enterprises with encryption techniques (1);Total;75,86 3.4. Information and communications (CNAE 58-63);J.1.D % of enterprises with encryption techniques (1);From 10 to 49;74,28 3.4. Information and communications (CNAE 58-63);J.1.D % of enterprises with encryption techniques (1);From 50 to 249;79,59 3.4. Information and communications (CNAE 58-63);J.1.D % of enterprises with encryption techniques (1);250 or more;87,95 3.4. Information and communications (CNAE 58-63);J.1.E % of enterprises with data backup in a separate location (1);Total;96,44 3.4. Information and communications (CNAE 58-63);J.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;96,78 3.4. Information and communications (CNAE 58-63);J.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;94,6 3.4. Information and communications (CNAE 58-63);J.1.E % of enterprises with data backup in a separate location (1);250 or more;98 3.4. Information and communications (CNAE 58-63);J.1.F % of enterprises with control of network access (1);Total;88,28 3.4. Information and communications (CNAE 58-63);J.1.F % of enterprises with control of network access (1);From 10 to 49;86,77 3.4. Information and communications (CNAE 58-63);J.1.F % of enterprises with control of network access (1);From 50 to 249;92,94 3.4. Information and communications (CNAE 58-63);J.1.F % of enterprises with control of network access (1);250 or more;95,55 3.4. Information and communications (CNAE 58-63);J.1.G % of enterprises with a Virtual Private Network (1);Total;78,75 3.4. Information and communications (CNAE 58-63);J.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;74,95 3.4. Information and communications (CNAE 58-63);J.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;90,7 3.4. Information and communications (CNAE 58-63);J.1.G % of enterprises with a Virtual Private Network (1);250 or more;96,55 3.4. Information and communications (CNAE 58-63);J.1.H % of enterprises that maintain log files to analyze security incidents (1);Total;75,29 3.4. Information and communications (CNAE 58-63);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;71,4 3.4. Information and communications (CNAE 58-63);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;87,71 3.4. Information and communications (CNAE 58-63);J.1.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;92,5 3.4. Information and communications (CNAE 58-63);J.1.J % of enterprises with an ICT risk assessment (1);Total;70,02 3.4. Information and communications (CNAE 58-63);J.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;66,88 3.4. Information and communications (CNAE 58-63);J.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;78,96 3.4. Information and communications (CNAE 58-63);J.1.J % of enterprises with an ICT risk assessment (1);250 or more;88,41 3.4. Information and communications (CNAE 58-63);J.1.K % of enterprises with an ICT security test (1);Total;68,25 3.4. Information and communications (CNAE 58-63);J.1.K % of enterprises with an ICT security test (1);From 10 to 49;64,9 3.4. Information and communications (CNAE 58-63);J.1.K % of enterprises with an ICT security test (1);From 50 to 249;77,68 3.4. Information and communications (CNAE 58-63);J.1.K % of enterprises with an ICT security test (1);250 or more;88,32 3.5. Real estate activities (CNAE 68);J.1 % of enterprises that apply some ICT security measure;Total;97,96 3.5. Real estate activities (CNAE 68);J.1 % of enterprises that apply some ICT security measure;From 10 to 49;97,86 3.5. Real estate activities (CNAE 68);J.1 % of enterprises that apply some ICT security measure;From 50 to 249;100 3.5. Real estate activities (CNAE 68);J.1 % of enterprises that apply some ICT security measure;250 or more;92,98 3.5. Real estate activities (CNAE 68);J.1.A % of enterprises with strong password authentication (1);Total;82,85 3.5. Real estate activities (CNAE 68);J.1.A % of enterprises with strong password authentication (1);From 10 to 49;81,65 3.5. Real estate activities (CNAE 68);J.1.A % of enterprises with strong password authentication (1);From 50 to 249;97,38 3.5. Real estate activities (CNAE 68);J.1.A % of enterprises with strong password authentication (1);250 or more;100 3.5. Real estate activities (CNAE 68);J.1.B % of enterprises that maintain software updated (1);Total;97,27 3.5. Real estate activities (CNAE 68);J.1.B % of enterprises that maintain software updated (1);From 10 to 49;97,52 3.5. Real estate activities (CNAE 68);J.1.B % of enterprises that maintain software updated (1);From 50 to 249;93,56 3.5. Real estate activities (CNAE 68);J.1.B % of enterprises that maintain software updated (1);250 or more;100 3.5. Real estate activities (CNAE 68);J.1.C % of enterprises with biometric authentication (1);Total;29,39 3.5. Real estate activities (CNAE 68);J.1.C % of enterprises with biometric authentication (1);From 10 to 49;28,48 3.5. Real estate activities (CNAE 68);J.1.C % of enterprises with biometric authentication (1);From 50 to 249;40,81 3.5. Real estate activities (CNAE 68);J.1.C % of enterprises with biometric authentication (1);250 or more;39,24 3.5. Real estate activities (CNAE 68);J.1.D % of enterprises with encryption techniques (1);Total;45,88 3.5. Real estate activities (CNAE 68);J.1.D % of enterprises with encryption techniques (1);From 10 to 49;44,45 3.5. Real estate activities (CNAE 68);J.1.D % of enterprises with encryption techniques (1);From 50 to 249;60,28 3.5. Real estate activities (CNAE 68);J.1.D % of enterprises with encryption techniques (1);250 or more;92,45 3.5. Real estate activities (CNAE 68);J.1.E % of enterprises with data backup in a separate location (1);Total;94,22 3.5. Real estate activities (CNAE 68);J.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;93,82 3.5. Real estate activities (CNAE 68);J.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;99,05 3.5. Real estate activities (CNAE 68);J.1.E % of enterprises with data backup in a separate location (1);250 or more;100 3.5. Real estate activities (CNAE 68);J.1.F % of enterprises with control of network access (1);Total;83,88 3.5. Real estate activities (CNAE 68);J.1.F % of enterprises with control of network access (1);From 10 to 49;83,3 3.5. Real estate activities (CNAE 68);J.1.F % of enterprises with control of network access (1);From 50 to 249;89,99 3.5. Real estate activities (CNAE 68);J.1.F % of enterprises with control of network access (1);250 or more;100 3.5. Real estate activities (CNAE 68);J.1.G % of enterprises with a Virtual Private Network (1);Total;61,68 3.5. Real estate activities (CNAE 68);J.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;60,01 3.5. Real estate activities (CNAE 68);J.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;80,35 3.5. Real estate activities (CNAE 68);J.1.G % of enterprises with a Virtual Private Network (1);250 or more;100 3.5. Real estate activities (CNAE 68);J.1.H % of enterprises that maintain log files to analyze security incidents (1);Total;49,64 3.5. Real estate activities (CNAE 68);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;47,81 3.5. Real estate activities (CNAE 68);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;70,46 3.5. Real estate activities (CNAE 68);J.1.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;87,54 3.5. Real estate activities (CNAE 68);J.1.J % of enterprises with an ICT risk assessment (1);Total;46,93 3.5. Real estate activities (CNAE 68);J.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;45,4 3.5. Real estate activities (CNAE 68);J.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;63,27 3.5. Real estate activities (CNAE 68);J.1.J % of enterprises with an ICT risk assessment (1);250 or more;87,54 3.5. Real estate activities (CNAE 68);J.1.K % of enterprises with an ICT security test (1);Total;42,67 3.5. Real estate activities (CNAE 68);J.1.K % of enterprises with an ICT security test (1);From 10 to 49;40,25 3.5. Real estate activities (CNAE 68);J.1.K % of enterprises with an ICT security test (1);From 50 to 249;69,5 3.5. Real estate activities (CNAE 68);J.1.K % of enterprises with an ICT security test (1);250 or more;100 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1 % of enterprises that apply some ICT security measure;Total;97,05 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1 % of enterprises that apply some ICT security measure;From 10 to 49;96,66 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1 % of enterprises that apply some ICT security measure;From 50 to 249;99,04 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1 % of enterprises that apply some ICT security measure;250 or more;99,39 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.A % of enterprises with strong password authentication (1);Total;85,73 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.A % of enterprises with strong password authentication (1);From 10 to 49;84,72 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.A % of enterprises with strong password authentication (1);From 50 to 249;89,14 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.A % of enterprises with strong password authentication (1);250 or more;98,67 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.B % of enterprises that maintain software updated (1);Total;97,67 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.B % of enterprises that maintain software updated (1);From 10 to 49;97,66 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.B % of enterprises that maintain software updated (1);From 50 to 249;97,18 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.B % of enterprises that maintain software updated (1);250 or more;100 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.C % of enterprises with biometric authentication (1);Total;32,61 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.C % of enterprises with biometric authentication (1);From 10 to 49;31,43 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.C % of enterprises with biometric authentication (1);From 50 to 249;36,81 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.C % of enterprises with biometric authentication (1);250 or more;46,49 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.D % of enterprises with encryption techniques (1);Total;56,61 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.D % of enterprises with encryption techniques (1);From 10 to 49;54,1 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.D % of enterprises with encryption techniques (1);From 50 to 249;65,88 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.D % of enterprises with encryption techniques (1);250 or more;84,81 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.E % of enterprises with data backup in a separate location (1);Total;96,18 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;95,81 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;98,06 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.E % of enterprises with data backup in a separate location (1);250 or more;98,4 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.F % of enterprises with control of network access (1);Total;86,36 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.F % of enterprises with control of network access (1);From 10 to 49;85,02 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.F % of enterprises with control of network access (1);From 50 to 249;92,9 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.F % of enterprises with control of network access (1);250 or more;94,91 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.G % of enterprises with a Virtual Private Network (1);Total;70,67 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;67,29 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;86,36 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.G % of enterprises with a Virtual Private Network (1);250 or more;95,52 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.H % of enterprises that maintain log files to analyze security incidents (1);Total;65,96 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;62,8 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;79,69 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;92,96 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.J % of enterprises with an ICT risk assessment (1);Total;50,96 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;47,61 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;64,8 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.J % of enterprises with an ICT risk assessment (1);250 or more;82,81 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.K % of enterprises with an ICT security test (1);Total;55,57 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.K % of enterprises with an ICT security test (1);From 10 to 49;53,02 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.K % of enterprises with an ICT security test (1);From 50 to 249;65,62 3.6. Professional, scientific and technical activities (CNAE 69-75);J.1.K % of enterprises with an ICT security test (1);250 or more;81,96 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1 % of enterprises that apply some ICT security measure;Total;87,34 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1 % of enterprises that apply some ICT security measure;From 10 to 49;85,66 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1 % of enterprises that apply some ICT security measure;From 50 to 249;91,24 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1 % of enterprises that apply some ICT security measure;250 or more;98,18 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.A % of enterprises with strong password authentication (1);Total;73,77 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.A % of enterprises with strong password authentication (1);From 10 to 49;69,02 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.A % of enterprises with strong password authentication (1);From 50 to 249;86,48 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.A % of enterprises with strong password authentication (1);250 or more;93,48 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.B % of enterprises that maintain software updated (1);Total;93,59 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.B % of enterprises that maintain software updated (1);From 10 to 49;92,71 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.B % of enterprises that maintain software updated (1);From 50 to 249;95,45 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.B % of enterprises that maintain software updated (1);250 or more;98,69 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.C % of enterprises with biometric authentication (1);Total;28,67 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.C % of enterprises with biometric authentication (1);From 10 to 49;28,71 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.C % of enterprises with biometric authentication (1);From 50 to 249;26,31 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.C % of enterprises with biometric authentication (1);250 or more;35,22 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.D % of enterprises with encryption techniques (1);Total;34,47 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.D % of enterprises with encryption techniques (1);From 10 to 49;29,95 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.D % of enterprises with encryption techniques (1);From 50 to 249;43,5 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.D % of enterprises with encryption techniques (1);250 or more;62,23 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.E % of enterprises with data backup in a separate location (1);Total;86,09 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;83,72 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;91,86 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.E % of enterprises with data backup in a separate location (1);250 or more;97,62 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.F % of enterprises with control of network access (1);Total;65,1 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.F % of enterprises with control of network access (1);From 10 to 49;60,46 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.F % of enterprises with control of network access (1);From 50 to 249;76,87 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.F % of enterprises with control of network access (1);250 or more;86,18 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.G % of enterprises with a Virtual Private Network (1);Total;36,66 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;29,46 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;52,86 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.G % of enterprises with a Virtual Private Network (1);250 or more;75,72 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.H % of enterprises that maintain log files to analyze security incidents (1);Total;38,61 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;33,39 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;50,06 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;67,8 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.J % of enterprises with an ICT risk assessment (1);Total;27,69 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;21,48 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;42,96 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.J % of enterprises with an ICT risk assessment (1);250 or more;57,56 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.K % of enterprises with an ICT security test (1);Total;25,43 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.K % of enterprises with an ICT security test (1);From 10 to 49;18,84 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.K % of enterprises with an ICT security test (1);From 50 to 249;40,62 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);J.1.K % of enterprises with an ICT security test (1);250 or more;60,1 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1 % of enterprises that apply some ICT security measure;Total;98,92 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1 % of enterprises that apply some ICT security measure;From 10 to 49;98,77 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1 % of enterprises that apply some ICT security measure;From 50 to 249;99,25 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1 % of enterprises that apply some ICT security measure;250 or more;100 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.A % of enterprises with strong password authentication (1);Total;94,84 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.A % of enterprises with strong password authentication (1);From 10 to 49;94,45 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.A % of enterprises with strong password authentication (1);From 50 to 249;95,85 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.A % of enterprises with strong password authentication (1);250 or more;96,92 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.B % of enterprises that maintain software updated (1);Total;99,31 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.B % of enterprises that maintain software updated (1);From 10 to 49;99,18 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.B % of enterprises that maintain software updated (1);From 50 to 249;99,77 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.B % of enterprises that maintain software updated (1);250 or more;99,54 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.C % of enterprises with biometric authentication (1);Total;39,81 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.C % of enterprises with biometric authentication (1);From 10 to 49;37,66 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.C % of enterprises with biometric authentication (1);From 50 to 249;45,26 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.C % of enterprises with biometric authentication (1);250 or more;52,74 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.D % of enterprises with encryption techniques (1);Total;73,75 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.D % of enterprises with encryption techniques (1);From 10 to 49;71,87 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.D % of enterprises with encryption techniques (1);From 50 to 249;77,88 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.D % of enterprises with encryption techniques (1);250 or more;87,8 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.E % of enterprises with data backup in a separate location (1);Total;96,36 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;96,22 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;96,37 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.E % of enterprises with data backup in a separate location (1);250 or more;98,62 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.F % of enterprises with control of network access (1);Total;91,76 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.F % of enterprises with control of network access (1);From 10 to 49;90,85 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.F % of enterprises with control of network access (1);From 50 to 249;93,98 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.F % of enterprises with control of network access (1);250 or more;97,41 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.G % of enterprises with a Virtual Private Network (1);Total;81,87 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;78,23 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;92,82 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.G % of enterprises with a Virtual Private Network (1);250 or more;96,39 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.H % of enterprises that maintain log files to analyze security incidents (1);Total;78,93 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;76,4 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.H % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;85,78 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.H % of enterprises that maintain log files to analyze security incidents (1);250 or more;92,25 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.J % of enterprises with an ICT risk assessment (1);Total;70,35 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;66,08 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;82,37 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.J % of enterprises with an ICT risk assessment (1);250 or more;90,76 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.K % of enterprises with an ICT security test (1);Total;66,62 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.K % of enterprises with an ICT security test (1);From 10 to 49;62,18 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.K % of enterprises with an ICT security test (1);From 50 to 249;79,38 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);J.1.K % of enterprises with an ICT security test (1);250 or more;86,8