Activity grouping (except CNAE 56, 64-66 and 95.1);Main variables;Size of the enterprise;Total Total Enterprises;G.1 % of enterprises that apply some ICT security measure;Total;89,07 Total Enterprises;G.1 % of enterprises that apply some ICT security measure;From 10 to 49;87,93 Total Enterprises;G.1 % of enterprises that apply some ICT security measure;From 50 to 249;93,96 Total Enterprises;G.1 % of enterprises that apply some ICT security measure;250 or more;97,78 Total Enterprises;G.1.A % of enterprises with strong password authentication (1);Total;89,04 Total Enterprises;G.1.A % of enterprises with strong password authentication (1);From 10 to 49;87,74 Total Enterprises;G.1.A % of enterprises with strong password authentication (1);From 50 to 249;94,35 Total Enterprises;G.1.A % of enterprises with strong password authentication (1);250 or more;97,6 Total Enterprises;G.1.B % of enterprises with biometric authentication (1);Total;17,58 Total Enterprises;G.1.B % of enterprises with biometric authentication (1);From 10 to 49;15,12 Total Enterprises;G.1.B % of enterprises with biometric authentication (1);From 50 to 249;26,08 Total Enterprises;G.1.B % of enterprises with biometric authentication (1);250 or more;41,09 Total Enterprises;G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;24,86 Total Enterprises;G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;20,82 Total Enterprises;G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;39,29 Total Enterprises;G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;61,14 Total Enterprises;G.1.D % of enterprises with encryption techniques (1);Total;34,76 Total Enterprises;G.1.D % of enterprises with encryption techniques (1);From 10 to 49;30,2 Total Enterprises;G.1.D % of enterprises with encryption techniques (1);From 50 to 249;51,32 Total Enterprises;G.1.D % of enterprises with encryption techniques (1);250 or more;74,33 Total Enterprises;G.1.E % of enterprises with data backup in a separate location (1);Total;90,61 Total Enterprises;G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;89,51 Total Enterprises;G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;95,23 Total Enterprises;G.1.E % of enterprises with data backup in a separate location (1);250 or more;97,05 Total Enterprises;G.1.F % of enterprises with control of network access (1);Total;70,26 Total Enterprises;G.1.F % of enterprises with control of network access (1);From 10 to 49;66,63 Total Enterprises;G.1.F % of enterprises with control of network access (1);From 50 to 249;85,18 Total Enterprises;G.1.F % of enterprises with control of network access (1);250 or more;93,05 Total Enterprises;G.1.G % of enterprises with a Virtual Private Network (1);Total;51,5 Total Enterprises;G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;45,47 Total Enterprises;G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;75,83 Total Enterprises;G.1.G % of enterprises with a Virtual Private Network (1);250 or more;91,91 Total Enterprises;G.1.H % of enterprises with an ICT security monitoring system;Total;39,75 Total Enterprises;G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;34,45 Total Enterprises;G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;60,2 Total Enterprises;G.1.H % of enterprises with an ICT security monitoring system;250 or more;79,81 Total Enterprises;G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;36,79 Total Enterprises;G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;30,92 Total Enterprises;G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;59,27 Total Enterprises;G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;82,36 Total Enterprises;G.1.J % of enterprises with an ICT risk assessment (1);Total;28,29 Total Enterprises;G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;22,98 Total Enterprises;G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;47,93 Total Enterprises;G.1.J % of enterprises with an ICT risk assessment (1);250 or more;72,79 Total Enterprises;G.1.K % of enterprises with an ICT security test (1);Total;33,56 Total Enterprises;G.1.K % of enterprises with an ICT security test (1);From 10 to 49;28,52 Total Enterprises;G.1.K % of enterprises with an ICT security test (1);From 50 to 249;52,15 Total Enterprises;G.1.K % of enterprises with an ICT security test (1);250 or more;76,12 Total Enterprises;G.2.A % of enterprises with voluntary ICT security training;Total;40,82 Total Enterprises;G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;36,78 Total Enterprises;G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;56,78 Total Enterprises;G.2.A % of enterprises with voluntary ICT security training;250 or more;78,4 Total Enterprises;G.2.B % of enterprises with obligations training on ICT security;Total;19,57 Total Enterprises;G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;16,11 Total Enterprises;G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;32,55 Total Enterprises;G.2.B % of enterprises with obligations training on ICT security;250 or more;55,13 Total Enterprises;G.2.C % of enterprises with ICT security obligations by contract;Total;20,05 Total Enterprises;G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;17,55 Total Enterprises;G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;30,24 Total Enterprises;G.2.C % of enterprises with ICT security obligations by contract;250 or more;41,77 Total Enterprises;G.3 % of enterprises with ICT security documentation;Total;28,51 Total Enterprises;G.3 % of enterprises with ICT security documentation;From 10 to 49;24,31 Total Enterprises;G.3 % of enterprises with ICT security documentation;From 50 to 249;44,32 Total Enterprises;G.3 % of enterprises with ICT security documentation;250 or more;71,68 Total Enterprises;G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;67,58 Total Enterprises;G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;65,68 Total Enterprises;G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;69,85 Total Enterprises;G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;79,41 Total Enterprises;G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;21,39 Total Enterprises;G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;22,54 Total Enterprises;G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;19,78 Total Enterprises;G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;14,96 Total Enterprises;G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;11,03 Total Enterprises;G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;11,77 Total Enterprises;G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;10,37 Total Enterprises;G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;5,63 Total Enterprises;G.5 % of enterprises with a security incident;Total;15,47 Total Enterprises;G.5 % of enterprises with a security incident;From 10 to 49;13,78 Total Enterprises;G.5 % of enterprises with a security incident;From 50 to 249;22,82 Total Enterprises;G.5 % of enterprises with a security incident;250 or more;27,65 Total Enterprises;G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;74,63 Total Enterprises;G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;72,81 Total Enterprises;G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;80,43 Total Enterprises;G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;76,94 Total Enterprises;G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;21,37 Total Enterprises;G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;20,68 Total Enterprises;G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;22,44 Total Enterprises;G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;27,03 Total Enterprises;G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;20,08 Total Enterprises;G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;21,13 Total Enterprises;G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;17,28 Total Enterprises;G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;16,35 Total Enterprises;G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;16,79 Total Enterprises;G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;17,86 Total Enterprises;G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;13,51 Total Enterprises;G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;14,99 Total Enterprises;G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;8,13 Total Enterprises;G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;7,77 Total Enterprises;G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;9,3 Total Enterprises;G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;8,48 Total Enterprises;G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;3,95 Total Enterprises;G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;2,91 Total Enterprises;G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;6,89 Total Enterprises;G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;6,84 Total Enterprises;G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;37,9 Total Enterprises;G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;33,29 Total Enterprises;G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;55,95 Total Enterprises;G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;81,94 Total Enterprises;G.6.B % of enterprises whose ICT security is handled by external providers;Total;64,74 Total Enterprises;G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;64,35 Total Enterprises;G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;66,74 Total Enterprises;G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;66,03 Total Enterprises;G.7 % of enterprises that have insurance against ICT security incidents;Total;20,83 Total Enterprises;G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;18,36 Total Enterprises;G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;30,7 Total Enterprises;G.7 % of enterprises that have insurance against ICT security incidents;250 or more;43,29 1. Total Industry (CNAE 10-39);G.1 % of enterprises that apply some ICT security measure;Total;87,21 1. Total Industry (CNAE 10-39);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;85,36 1. Total Industry (CNAE 10-39);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;94,64 1. Total Industry (CNAE 10-39);G.1 % of enterprises that apply some ICT security measure;250 or more;98,25 1. Total Industry (CNAE 10-39);G.1.A % of enterprises with strong password authentication (1);Total;86,18 1. Total Industry (CNAE 10-39);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;83,77 1. Total Industry (CNAE 10-39);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;94,78 1. Total Industry (CNAE 10-39);G.1.A % of enterprises with strong password authentication (1);250 or more;99,06 1. Total Industry (CNAE 10-39);G.1.B % of enterprises with biometric authentication (1);Total;17,31 1. Total Industry (CNAE 10-39);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;13,64 1. Total Industry (CNAE 10-39);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;28,94 1. Total Industry (CNAE 10-39);G.1.B % of enterprises with biometric authentication (1);250 or more;44,17 1. Total Industry (CNAE 10-39);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;20,75 1. Total Industry (CNAE 10-39);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;15,26 1. Total Industry (CNAE 10-39);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;36,45 1. Total Industry (CNAE 10-39);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;68,89 1. Total Industry (CNAE 10-39);G.1.D % of enterprises with encryption techniques (1);Total;29,23 1. Total Industry (CNAE 10-39);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;23,54 1. Total Industry (CNAE 10-39);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;45,98 1. Total Industry (CNAE 10-39);G.1.D % of enterprises with encryption techniques (1);250 or more;76,91 1. Total Industry (CNAE 10-39);G.1.E % of enterprises with data backup in a separate location (1);Total;89,19 1. Total Industry (CNAE 10-39);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;87,64 1. Total Industry (CNAE 10-39);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;94,75 1. Total Industry (CNAE 10-39);G.1.E % of enterprises with data backup in a separate location (1);250 or more;97,63 1. Total Industry (CNAE 10-39);G.1.F % of enterprises with control of network access (1);Total;67,67 1. Total Industry (CNAE 10-39);G.1.F % of enterprises with control of network access (1);From 10 to 49;62,46 1. Total Industry (CNAE 10-39);G.1.F % of enterprises with control of network access (1);From 50 to 249;86,2 1. Total Industry (CNAE 10-39);G.1.F % of enterprises with control of network access (1);250 or more;96,05 1. Total Industry (CNAE 10-39);G.1.G % of enterprises with a Virtual Private Network (1);Total;45,88 1. Total Industry (CNAE 10-39);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;36,82 1. Total Industry (CNAE 10-39);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;77,87 1. Total Industry (CNAE 10-39);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;96,24 1. Total Industry (CNAE 10-39);G.1.H % of enterprises with an ICT security monitoring system;Total;35,21 1. Total Industry (CNAE 10-39);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;27,99 1. Total Industry (CNAE 10-39);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;59,1 1. Total Industry (CNAE 10-39);G.1.H % of enterprises with an ICT security monitoring system;250 or more;83,32 1. Total Industry (CNAE 10-39);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;30,76 1. Total Industry (CNAE 10-39);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;22,2 1. Total Industry (CNAE 10-39);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;58,79 1. Total Industry (CNAE 10-39);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;88,95 1. Total Industry (CNAE 10-39);G.1.J % of enterprises with an ICT risk assessment (1);Total;23,32 1. Total Industry (CNAE 10-39);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;15,94 1. Total Industry (CNAE 10-39);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;47,16 1. Total Industry (CNAE 10-39);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;75,02 1. Total Industry (CNAE 10-39);G.1.K % of enterprises with an ICT security test (1);Total;29,05 1. Total Industry (CNAE 10-39);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;21,91 1. Total Industry (CNAE 10-39);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;52,1 1. Total Industry (CNAE 10-39);G.1.K % of enterprises with an ICT security test (1);250 or more;79,22 1. Total Industry (CNAE 10-39);G.2.A % of enterprises with voluntary ICT security training;Total;34,71 1. Total Industry (CNAE 10-39);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;28,85 1. Total Industry (CNAE 10-39);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;55,23 1. Total Industry (CNAE 10-39);G.2.A % of enterprises with voluntary ICT security training;250 or more;84,26 1. Total Industry (CNAE 10-39);G.2.B % of enterprises with obligations training on ICT security;Total;14,83 1. Total Industry (CNAE 10-39);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;10,25 1. Total Industry (CNAE 10-39);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;29,91 1. Total Industry (CNAE 10-39);G.2.B % of enterprises with obligations training on ICT security;250 or more;58,22 1. Total Industry (CNAE 10-39);G.2.C % of enterprises with ICT security obligations by contract;Total;15,2 1. Total Industry (CNAE 10-39);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;12,04 1. Total Industry (CNAE 10-39);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;26,17 1. Total Industry (CNAE 10-39);G.2.C % of enterprises with ICT security obligations by contract;250 or more;42,38 1. Total Industry (CNAE 10-39);G.3 % of enterprises with ICT security documentation;Total;23,09 1. Total Industry (CNAE 10-39);G.3 % of enterprises with ICT security documentation;From 10 to 49;17,24 1. Total Industry (CNAE 10-39);G.3 % of enterprises with ICT security documentation;From 50 to 249;42,84 1. Total Industry (CNAE 10-39);G.3 % of enterprises with ICT security documentation;250 or more;76,42 1. Total Industry (CNAE 10-39);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;64,59 1. Total Industry (CNAE 10-39);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;60,67 1. Total Industry (CNAE 10-39);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;68,58 1. Total Industry (CNAE 10-39);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;76,32 1. Total Industry (CNAE 10-39);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;20,36 1. Total Industry (CNAE 10-39);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;20,8 1. Total Industry (CNAE 10-39);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;20,72 1. Total Industry (CNAE 10-39);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;16,8 1. Total Industry (CNAE 10-39);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;15,05 1. Total Industry (CNAE 10-39);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;18,53 1. Total Industry (CNAE 10-39);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;10,7 1. Total Industry (CNAE 10-39);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;6,88 1. Total Industry (CNAE 10-39);G.5 % of enterprises with a security incident;Total;14,04 1. Total Industry (CNAE 10-39);G.5 % of enterprises with a security incident;From 10 to 49;11,81 1. Total Industry (CNAE 10-39);G.5 % of enterprises with a security incident;From 50 to 249;22,38 1. Total Industry (CNAE 10-39);G.5 % of enterprises with a security incident;250 or more;30,05 1. Total Industry (CNAE 10-39);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;73,6 1. Total Industry (CNAE 10-39);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;69,84 1. Total Industry (CNAE 10-39);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;82,5 1. Total Industry (CNAE 10-39);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;78,94 1. Total Industry (CNAE 10-39);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;20,55 1. Total Industry (CNAE 10-39);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;20,9 1. Total Industry (CNAE 10-39);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;19,54 1. Total Industry (CNAE 10-39);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;20,74 1. Total Industry (CNAE 10-39);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;18,46 1. Total Industry (CNAE 10-39);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;21,24 1. Total Industry (CNAE 10-39);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;11,72 1. Total Industry (CNAE 10-39);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;15,05 1. Total Industry (CNAE 10-39);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;17,34 1. Total Industry (CNAE 10-39);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;20,52 1. Total Industry (CNAE 10-39);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;9,19 1. Total Industry (CNAE 10-39);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;15,15 1. Total Industry (CNAE 10-39);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;8,95 1. Total Industry (CNAE 10-39);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;9,67 1. Total Industry (CNAE 10-39);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;6,89 1. Total Industry (CNAE 10-39);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;9,25 1. Total Industry (CNAE 10-39);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;3,86 1. Total Industry (CNAE 10-39);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;3,81 1. Total Industry (CNAE 10-39);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;3,47 1. Total Industry (CNAE 10-39);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;5,75 1. Total Industry (CNAE 10-39);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;32,81 1. Total Industry (CNAE 10-39);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;26,03 1. Total Industry (CNAE 10-39);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;56,85 1. Total Industry (CNAE 10-39);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;88,75 1. Total Industry (CNAE 10-39);G.6.B % of enterprises whose ICT security is handled by external providers;Total;67,01 1. Total Industry (CNAE 10-39);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;66,11 1. Total Industry (CNAE 10-39);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;70,87 1. Total Industry (CNAE 10-39);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;71,13 1. Total Industry (CNAE 10-39);G.7 % of enterprises that have insurance against ICT security incidents;Total;18,12 1. Total Industry (CNAE 10-39);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;15,32 1. Total Industry (CNAE 10-39);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;27,81 1. Total Industry (CNAE 10-39);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;42,49 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1 % of enterprises that apply some ICT security measure;Total;82,65 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;80,66 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;92,51 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1 % of enterprises that apply some ICT security measure;250 or more;96,52 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.A % of enterprises with strong password authentication (1);Total;85,23 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;83,42 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;92,43 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.A % of enterprises with strong password authentication (1);250 or more;98,98 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.B % of enterprises with biometric authentication (1);Total;14,71 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;11,34 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;27,17 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.B % of enterprises with biometric authentication (1);250 or more;45,28 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;15,78 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;11,88 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;27,85 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;63,56 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.D % of enterprises with encryption techniques (1);Total;24,69 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;20,76 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;37,99 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.D % of enterprises with encryption techniques (1);250 or more;66,76 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.E % of enterprises with data backup in a separate location (1);Total;83,87 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;81,53 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;94,32 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.E % of enterprises with data backup in a separate location (1);250 or more;95,79 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.F % of enterprises with control of network access (1);Total;61,17 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.F % of enterprises with control of network access (1);From 10 to 49;56,15 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.F % of enterprises with control of network access (1);From 50 to 249;82,15 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.F % of enterprises with control of network access (1);250 or more;94,37 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.G % of enterprises with a Virtual Private Network (1);Total;36,5 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;29,01 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;66,27 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;93,74 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.H % of enterprises with an ICT security monitoring system;Total;28,57 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;22,71 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;51,3 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.H % of enterprises with an ICT security monitoring system;250 or more;76,31 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;24,16 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;16,86 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;52,43 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;84,08 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.J % of enterprises with an ICT risk assessment (1);Total;17,02 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;10,64 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;42,6 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;64,5 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.K % of enterprises with an ICT security test (1);Total;23,71 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;17,23 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;50,09 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.K % of enterprises with an ICT security test (1);250 or more;69,97 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.A % of enterprises with voluntary ICT security training;Total;32,5 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;28,7 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;48,59 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.A % of enterprises with voluntary ICT security training;250 or more;73,81 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.B % of enterprises with obligations training on ICT security;Total;11,65 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;8,93 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;23,06 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.B % of enterprises with obligations training on ICT security;250 or more;41,95 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.C % of enterprises with ICT security obligations by contract;Total;11,99 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;9,94 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;20,35 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.C % of enterprises with ICT security obligations by contract;250 or more;35,82 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.3 % of enterprises with ICT security documentation;Total;17,57 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.3 % of enterprises with ICT security documentation;From 10 to 49;13,64 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.3 % of enterprises with ICT security documentation;From 50 to 249;33,39 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.3 % of enterprises with ICT security documentation;250 or more;65,07 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;60,89 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;56,33 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;69,04 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;70,66 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;18,65 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;19,28 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;17,61 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;17,08 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;20,45 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;24,39 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;13,36 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;12,27 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5 % of enterprises with a security incident;Total;12,82 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5 % of enterprises with a security incident;From 10 to 49;11,11 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5 % of enterprises with a security incident;From 50 to 249;20,8 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5 % of enterprises with a security incident;250 or more;27,57 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;73,63 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;70,61 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;82,58 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;78,11 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;19,54 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;20,21 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;17,37 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;19,4 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;20,56 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;24,02 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;10,12 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;16,06 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;16,03 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;18,19 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;9,18 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;14,66 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;3,36 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;2,33 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;5,05 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;10,58 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;4,13 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;5,33 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;0 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;4,65 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;27,22 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;21,38 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;53,03 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;85,18 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.6.B % of enterprises whose ICT security is handled by external providers;Total;63,5 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;62,23 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;70,26 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;69,82 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.7 % of enterprises that have insurance against ICT security incidents;Total;16,56 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;14,54 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;25,99 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;33,66 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1 % of enterprises that apply some ICT security measure;Total;92,39 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;90,55 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;97,41 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1 % of enterprises that apply some ICT security measure;250 or more;98,9 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.A % of enterprises with strong password authentication (1);Total;88,16 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;84,95 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;95,93 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.A % of enterprises with strong password authentication (1);250 or more;100 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.B % of enterprises with biometric authentication (1);Total;23,77 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;18,64 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;36,64 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.B % of enterprises with biometric authentication (1);250 or more;40,81 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;26,73 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;17,53 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;46,98 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;69,19 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.D % of enterprises with encryption techniques (1);Total;35,86 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;26,1 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;56,9 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.D % of enterprises with encryption techniques (1);250 or more;82,46 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.E % of enterprises with data backup in a separate location (1);Total;92,66 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;90,8 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;97,38 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.E % of enterprises with data backup in a separate location (1);250 or more;98,62 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.F % of enterprises with control of network access (1);Total;72,38 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.F % of enterprises with control of network access (1);From 10 to 49;64,9 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.F % of enterprises with control of network access (1);From 50 to 249;91,13 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.F % of enterprises with control of network access (1);250 or more;97,21 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.G % of enterprises with a Virtual Private Network (1);Total;55,04 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;42,05 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;87,48 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;98,89 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.H % of enterprises with an ICT security monitoring system;Total;43,42 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;32,52 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;69,53 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.H % of enterprises with an ICT security monitoring system;250 or more;84,78 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;40,27 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;27,41 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;70,46 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;91,68 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.J % of enterprises with an ICT risk assessment (1);Total;33,33 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;23,39 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;55,7 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;77,05 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.K % of enterprises with an ICT security test (1);Total;36,29 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;26,08 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;58,31 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.K % of enterprises with an ICT security test (1);250 or more;85,02 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.A % of enterprises with voluntary ICT security training;Total;42,81 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;34,15 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;61,7 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.A % of enterprises with voluntary ICT security training;250 or more;93 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.B % of enterprises with obligations training on ICT security;Total;20,77 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;12,75 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;38,7 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.B % of enterprises with obligations training on ICT security;250 or more;65,53 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.C % of enterprises with ICT security obligations by contract;Total;22,65 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;16,55 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;37,72 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.C % of enterprises with ICT security obligations by contract;250 or more;50,61 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.3 % of enterprises with ICT security documentation;Total;31,43 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.3 % of enterprises with ICT security documentation;From 10 to 49;20,88 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.3 % of enterprises with ICT security documentation;From 50 to 249;56,47 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.3 % of enterprises with ICT security documentation;250 or more;84,2 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;66,79 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;65,91 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;63 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;80,77 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;20,79 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;16,36 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;29,06 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;13,92 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;12,42 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;17,73 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;7,94 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;5,31 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5 % of enterprises with a security incident;Total;16,06 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5 % of enterprises with a security incident;From 10 to 49;13 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5 % of enterprises with a security incident;From 50 to 249;23,71 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5 % of enterprises with a security incident;250 or more;29,78 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;77,13 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;73,33 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;84,49 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;77,34 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;20,14 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;15,67 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;29,56 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;17,8 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;16,09 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;19,29 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;11,99 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;8,91 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;13,97 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;15,84 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;10,41 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;13,67 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;12,46 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;15,6 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;6,51 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;11,8 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;4,29 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;2,06 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;8,62 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;4,31 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;37,45 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;27,26 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;61,04 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;90,76 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.6.B % of enterprises whose ICT security is handled by external providers;Total;75,11 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;75,02 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;75,65 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;74,23 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.7 % of enterprises that have insurance against ICT security incidents;Total;22,45 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;18,09 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;31,13 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;51,11 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1 % of enterprises that apply some ICT security measure;Total;86,72 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;85,22 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;95,02 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1 % of enterprises that apply some ICT security measure;250 or more;98,6 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.A % of enterprises with strong password authentication (1);Total;84,6 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;82,43 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;95,67 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.A % of enterprises with strong password authentication (1);250 or more;97 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.B % of enterprises with biometric authentication (1);Total;13,99 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;10,93 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;28,86 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.B % of enterprises with biometric authentication (1);250 or more;36,79 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;17,2 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;13,89 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;29,73 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;66,72 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.D % of enterprises with encryption techniques (1);Total;27,98 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;24,83 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;40,61 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.D % of enterprises with encryption techniques (1);250 or more;70,42 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.E % of enterprises with data backup in a separate location (1);Total;90,31 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;89,48 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;94,2 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.E % of enterprises with data backup in a separate location (1);250 or more;97,63 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.F % of enterprises with control of network access (1);Total;66,01 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.F % of enterprises with control of network access (1);From 10 to 49;62,4 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.F % of enterprises with control of network access (1);From 50 to 249;83,19 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.F % of enterprises with control of network access (1);250 or more;95,74 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.G % of enterprises with a Virtual Private Network (1);Total;43,48 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;36,62 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;76,86 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;94,47 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.H % of enterprises with an ICT security monitoring system;Total;31,85 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;26,28 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;57,31 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.H % of enterprises with an ICT security monitoring system;250 or more;84,63 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;24,47 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;17,79 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;55,33 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;85,66 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.J % of enterprises with an ICT risk assessment (1);Total;18,93 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;13,73 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;41,78 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;74,72 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.K % of enterprises with an ICT security test (1);Total;24,79 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;20,48 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;42,62 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.K % of enterprises with an ICT security test (1);250 or more;79,04 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.A % of enterprises with voluntary ICT security training;Total;27,68 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;23,62 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;47,98 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.A % of enterprises with voluntary ICT security training;250 or more;75,23 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.B % of enterprises with obligations training on ICT security;Total;11,65 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;8,84 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;24,23 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.B % of enterprises with obligations training on ICT security;250 or more;54,9 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.C % of enterprises with ICT security obligations by contract;Total;12,41 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;11,21 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;17,46 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.C % of enterprises with ICT security obligations by contract;250 or more;33,01 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.3 % of enterprises with ICT security documentation;Total;18,69 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.3 % of enterprises with ICT security documentation;From 10 to 49;16,04 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.3 % of enterprises with ICT security documentation;From 50 to 249;28,56 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.3 % of enterprises with ICT security documentation;250 or more;74,07 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;66,2 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;60,93 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;81,86 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;77,15 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;19,2 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;21,69 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;10,48 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;17,7 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;14,6 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;17,38 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;7,65 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;5,15 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5 % of enterprises with a security incident;Total;12,99 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5 % of enterprises with a security incident;From 10 to 49;11,47 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5 % of enterprises with a security incident;From 50 to 249;21,04 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5 % of enterprises with a security incident;250 or more;27,7 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;70,42 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;65,67 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;84,79 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;85,66 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;23,82 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;25,14 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;18,16 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;28,77 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;19,53 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;22,06 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;9,72 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;23,15 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;21,51 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;24,55 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;12,07 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;13,1 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;14,83 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;17,84 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;3,69 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;16,51 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;5,64 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;6,33 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;2,32 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;10,4 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;28 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;23,09 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;52,5 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;85,59 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.6.B % of enterprises whose ICT security is handled by external providers;Total;67,82 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;66,97 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;72,1 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;77,4 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.7 % of enterprises that have insurance against ICT security incidents;Total;17,23 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;14,25 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;33,35 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;43,43 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1 % of enterprises that apply some ICT security measure;Total;89,95 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;88,66 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;94,28 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1 % of enterprises that apply some ICT security measure;250 or more;99,22 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.A % of enterprises with strong password authentication (1);Total;85,46 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;82,58 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;95,55 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.A % of enterprises with strong password authentication (1);250 or more;99,17 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.B % of enterprises with biometric authentication (1);Total;18,82 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;15,94 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;25,33 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.B % of enterprises with biometric authentication (1);250 or more;48,96 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;24,44 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;18,12 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;41,96 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;75,59 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.D % of enterprises with encryption techniques (1);Total;29,78 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;22,9 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;49,5 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.D % of enterprises with encryption techniques (1);250 or more;82,51 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.E % of enterprises with data backup in a separate location (1);Total;93,7 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;93,32 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;94,34 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.E % of enterprises with data backup in a separate location (1);250 or more;98,58 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.F % of enterprises with control of network access (1);Total;72,99 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.F % of enterprises with control of network access (1);From 10 to 49;68,03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.F % of enterprises with control of network access (1);From 50 to 249;90,55 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.F % of enterprises with control of network access (1);250 or more;96,13 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.G % of enterprises with a Virtual Private Network (1);Total;51,77 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;42,19 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;85,45 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;97,34 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.H % of enterprises with an ICT security monitoring system;Total;39,98 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;32,89 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;62,03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.H % of enterprises with an ICT security monitoring system;250 or more;86,65 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;35,12 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;27,03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;59,55 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;91,67 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.J % of enterprises with an ICT risk assessment (1);Total;25,97 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;18,31 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;48,37 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;82,75 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.K % of enterprises with an ICT security test (1);Total;32,09 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;24,8 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;53,95 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.K % of enterprises with an ICT security test (1);250 or more;83,78 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.A % of enterprises with voluntary ICT security training;Total;35,76 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;27,93 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;62,2 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.A % of enterprises with voluntary ICT security training;250 or more;90,96 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.B % of enterprises with obligations training on ICT security;Total;16,14 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;10,44 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;33,04 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.B % of enterprises with obligations training on ICT security;250 or more;67,12 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.C % of enterprises with ICT security obligations by contract;Total;16,34 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;12,16 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;30,54 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.C % of enterprises with ICT security obligations by contract;250 or more;45,46 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.3 % of enterprises with ICT security documentation;Total;27,13 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.3 % of enterprises with ICT security documentation;From 10 to 49;19,58 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.3 % of enterprises with ICT security documentation;From 50 to 249;52,27 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.3 % of enterprises with ICT security documentation;250 or more;82,01 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;66,81 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;64,75 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;67,92 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;74,83 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;19,87 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;20,21 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;19,16 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;20,19 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;13,31 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;15,04 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;12,92 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;4,98 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5 % of enterprises with a security incident;Total;13,65 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5 % of enterprises with a security incident;From 10 to 49;10,39 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5 % of enterprises with a security incident;From 50 to 249;25,31 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5 % of enterprises with a security incident;250 or more;33,35 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;74,2 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;69,78 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;80,92 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;81,75 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;19,97 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;23,05 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;13,25 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;21,96 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;15,57 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;16,24 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;13,94 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;16,6 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;17,86 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;24,86 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;5,2 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;13,17 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;12,87 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;14,24 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;12,03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;6,05 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;2,2 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;0 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;4,79 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;8,63 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;38,76 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;31,73 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;61,68 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;91,96 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.6.B % of enterprises whose ICT security is handled by external providers;Total;67,05 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;66,93 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;67,72 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;66,66 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.7 % of enterprises that have insurance against ICT security incidents;Total;18,35 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;16,16 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;23,71 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;43,34 1.5. Energy and water (CNAE 35-39);G.1 % of enterprises that apply some ICT security measure;Total;94,61 1.5. Energy and water (CNAE 35-39);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;93,51 1.5. Energy and water (CNAE 35-39);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;97,11 1.5. Energy and water (CNAE 35-39);G.1 % of enterprises that apply some ICT security measure;250 or more;99,01 1.5. Energy and water (CNAE 35-39);G.1.A % of enterprises with strong password authentication (1);Total;94,42 1.5. Energy and water (CNAE 35-39);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;93,16 1.5. Energy and water (CNAE 35-39);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;97,23 1.5. Energy and water (CNAE 35-39);G.1.A % of enterprises with strong password authentication (1);250 or more;98,96 1.5. Energy and water (CNAE 35-39);G.1.B % of enterprises with biometric authentication (1);Total;20,01 1.5. Energy and water (CNAE 35-39);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;15,51 1.5. Energy and water (CNAE 35-39);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;27,76 1.5. Energy and water (CNAE 35-39);G.1.B % of enterprises with biometric authentication (1);250 or more;43,92 1.5. Energy and water (CNAE 35-39);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;30,78 1.5. Energy and water (CNAE 35-39);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;24,6 1.5. Energy and water (CNAE 35-39);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;40,08 1.5. Energy and water (CNAE 35-39);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;68,49 1.5. Energy and water (CNAE 35-39);G.1.D % of enterprises with encryption techniques (1);Total;40,74 1.5. Energy and water (CNAE 35-39);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;34,08 1.5. Energy and water (CNAE 35-39);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;49,68 1.5. Energy and water (CNAE 35-39);G.1.D % of enterprises with encryption techniques (1);250 or more;85,07 1.5. Energy and water (CNAE 35-39);G.1.E % of enterprises with data backup in a separate location (1);Total;90,44 1.5. Energy and water (CNAE 35-39);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;89,26 1.5. Energy and water (CNAE 35-39);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;92,05 1.5. Energy and water (CNAE 35-39);G.1.E % of enterprises with data backup in a separate location (1);250 or more;98,16 1.5. Energy and water (CNAE 35-39);G.1.F % of enterprises with control of network access (1);Total;77,82 1.5. Energy and water (CNAE 35-39);G.1.F % of enterprises with control of network access (1);From 10 to 49;74,7 1.5. Energy and water (CNAE 35-39);G.1.F % of enterprises with control of network access (1);From 50 to 249;82,12 1.5. Energy and water (CNAE 35-39);G.1.F % of enterprises with control of network access (1);250 or more;98,16 1.5. Energy and water (CNAE 35-39);G.1.G % of enterprises with a Virtual Private Network (1);Total;61,64 1.5. Energy and water (CNAE 35-39);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;53,4 1.5. Energy and water (CNAE 35-39);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;78,5 1.5. Energy and water (CNAE 35-39);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;96,32 1.5. Energy and water (CNAE 35-39);G.1.H % of enterprises with an ICT security monitoring system;Total;44,58 1.5. Energy and water (CNAE 35-39);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;36,42 1.5. Energy and water (CNAE 35-39);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;58,12 1.5. Energy and water (CNAE 35-39);G.1.H % of enterprises with an ICT security monitoring system;250 or more;89,79 1.5. Energy and water (CNAE 35-39);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;46,93 1.5. Energy and water (CNAE 35-39);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;39,19 1.5. Energy and water (CNAE 35-39);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;58,92 1.5. Energy and water (CNAE 35-39);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;92,84 1.5. Energy and water (CNAE 35-39);G.1.J % of enterprises with an ICT risk assessment (1);Total;37,63 1.5. Energy and water (CNAE 35-39);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;29,91 1.5. Energy and water (CNAE 35-39);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;50,38 1.5. Energy and water (CNAE 35-39);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;80,67 1.5. Energy and water (CNAE 35-39);G.1.K % of enterprises with an ICT security test (1);Total;42,87 1.5. Energy and water (CNAE 35-39);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;35,23 1.5. Energy and water (CNAE 35-39);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;56,85 1.5. Energy and water (CNAE 35-39);G.1.K % of enterprises with an ICT security test (1);250 or more;80,76 1.5. Energy and water (CNAE 35-39);G.2.A % of enterprises with voluntary ICT security training;Total;47,08 1.5. Energy and water (CNAE 35-39);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;40,32 1.5. Energy and water (CNAE 35-39);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;58,69 1.5. Energy and water (CNAE 35-39);G.2.A % of enterprises with voluntary ICT security training;250 or more;86,85 1.5. Energy and water (CNAE 35-39);G.2.B % of enterprises with obligations training on ICT security;Total;25,75 1.5. Energy and water (CNAE 35-39);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;18,58 1.5. Energy and water (CNAE 35-39);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;37,74 1.5. Energy and water (CNAE 35-39);G.2.B % of enterprises with obligations training on ICT security;250 or more;69,2 1.5. Energy and water (CNAE 35-39);G.2.C % of enterprises with ICT security obligations by contract;Total;21,67 1.5. Energy and water (CNAE 35-39);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;18,99 1.5. Energy and water (CNAE 35-39);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;24,31 1.5. Energy and water (CNAE 35-39);G.2.C % of enterprises with ICT security obligations by contract;250 or more;44,36 1.5. Energy and water (CNAE 35-39);G.3 % of enterprises with ICT security documentation;Total;36,07 1.5. Energy and water (CNAE 35-39);G.3 % of enterprises with ICT security documentation;From 10 to 49;29,51 1.5. Energy and water (CNAE 35-39);G.3 % of enterprises with ICT security documentation;From 50 to 249;45,88 1.5. Energy and water (CNAE 35-39);G.3 % of enterprises with ICT security documentation;250 or more;79,76 1.5. Energy and water (CNAE 35-39);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;61,92 1.5. Energy and water (CNAE 35-39);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;53,27 1.5. Energy and water (CNAE 35-39);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;70,9 1.5. Energy and water (CNAE 35-39);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;81,97 1.5. Energy and water (CNAE 35-39);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;28,6 1.5. Energy and water (CNAE 35-39);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;34,89 1.5. Energy and water (CNAE 35-39);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;22,36 1.5. Energy and water (CNAE 35-39);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;13,46 1.5. Energy and water (CNAE 35-39);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;9,48 1.5. Energy and water (CNAE 35-39);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;11,84 1.5. Energy and water (CNAE 35-39);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;6,74 1.5. Energy and water (CNAE 35-39);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;4,57 1.5. Energy and water (CNAE 35-39);G.5 % of enterprises with a security incident;Total;22,04 1.5. Energy and water (CNAE 35-39);G.5 % of enterprises with a security incident;From 10 to 49;22,17 1.5. Energy and water (CNAE 35-39);G.5 % of enterprises with a security incident;From 50 to 249;18,83 1.5. Energy and water (CNAE 35-39);G.5 % of enterprises with a security incident;250 or more;31,83 1.5. Energy and water (CNAE 35-39);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;71,24 1.5. Energy and water (CNAE 35-39);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;69,67 1.5. Energy and water (CNAE 35-39);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;77,44 1.5. Energy and water (CNAE 35-39);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;71,36 1.5. Energy and water (CNAE 35-39);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;20,58 1.5. Energy and water (CNAE 35-39);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;18,81 1.5. Energy and water (CNAE 35-39);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;27,92 1.5. Energy and water (CNAE 35-39);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;20,05 1.5. Energy and water (CNAE 35-39);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;20,2 1.5. Energy and water (CNAE 35-39);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;22,69 1.5. Energy and water (CNAE 35-39);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;13,11 1.5. Energy and water (CNAE 35-39);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;14,32 1.5. Energy and water (CNAE 35-39);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;19,62 1.5. Energy and water (CNAE 35-39);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;19,66 1.5. Energy and water (CNAE 35-39);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;16,31 1.5. Energy and water (CNAE 35-39);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;26,13 1.5. Energy and water (CNAE 35-39);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;2,62 1.5. Energy and water (CNAE 35-39);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;2,9 1.5. Energy and water (CNAE 35-39);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;1,37 1.5. Energy and water (CNAE 35-39);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;2,86 1.5. Energy and water (CNAE 35-39);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;2,83 1.5. Energy and water (CNAE 35-39);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;3,88 1.5. Energy and water (CNAE 35-39);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;0 1.5. Energy and water (CNAE 35-39);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;0 1.5. Energy and water (CNAE 35-39);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;49,36 1.5. Energy and water (CNAE 35-39);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;44,23 1.5. Energy and water (CNAE 35-39);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;55,37 1.5. Energy and water (CNAE 35-39);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;89,58 1.5. Energy and water (CNAE 35-39);G.6.B % of enterprises whose ICT security is handled by external providers;Total;66,51 1.5. Energy and water (CNAE 35-39);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;65,27 1.5. Energy and water (CNAE 35-39);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;68,94 1.5. Energy and water (CNAE 35-39);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;72,78 1.5. Energy and water (CNAE 35-39);G.7 % of enterprises that have insurance against ICT security incidents;Total;19,31 1.5. Energy and water (CNAE 35-39);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;14,15 1.5. Energy and water (CNAE 35-39);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;29,45 1.5. Energy and water (CNAE 35-39);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;45,31 2. Total Construction (CNAE 41-43);G.1 % of enterprises that apply some ICT security measure;Total;85,69 2. Total Construction (CNAE 41-43);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;85,03 2. Total Construction (CNAE 41-43);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;91,94 2. Total Construction (CNAE 41-43);G.1 % of enterprises that apply some ICT security measure;250 or more;95,82 2. Total Construction (CNAE 41-43);G.1.A % of enterprises with strong password authentication (1);Total;87,01 2. Total Construction (CNAE 41-43);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;86,23 2. Total Construction (CNAE 41-43);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;93,98 2. Total Construction (CNAE 41-43);G.1.A % of enterprises with strong password authentication (1);250 or more;95,53 2. Total Construction (CNAE 41-43);G.1.B % of enterprises with biometric authentication (1);Total;11,44 2. Total Construction (CNAE 41-43);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;10,81 2. Total Construction (CNAE 41-43);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;15,31 2. Total Construction (CNAE 41-43);G.1.B % of enterprises with biometric authentication (1);250 or more;38,15 2. Total Construction (CNAE 41-43);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;18,65 2. Total Construction (CNAE 41-43);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;17,6 2. Total Construction (CNAE 41-43);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;24,7 2. Total Construction (CNAE 41-43);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;66,48 2. Total Construction (CNAE 41-43);G.1.D % of enterprises with encryption techniques (1);Total;23,23 2. Total Construction (CNAE 41-43);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;21,31 2. Total Construction (CNAE 41-43);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;37,5 2. Total Construction (CNAE 41-43);G.1.D % of enterprises with encryption techniques (1);250 or more;74,84 2. Total Construction (CNAE 41-43);G.1.E % of enterprises with data backup in a separate location (1);Total;86,5 2. Total Construction (CNAE 41-43);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;85,77 2. Total Construction (CNAE 41-43);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;93,2 2. Total Construction (CNAE 41-43);G.1.E % of enterprises with data backup in a separate location (1);250 or more;92,2 2. Total Construction (CNAE 41-43);G.1.F % of enterprises with control of network access (1);Total;58,3 2. Total Construction (CNAE 41-43);G.1.F % of enterprises with control of network access (1);From 10 to 49;55,99 2. Total Construction (CNAE 41-43);G.1.F % of enterprises with control of network access (1);From 50 to 249;78,16 2. Total Construction (CNAE 41-43);G.1.F % of enterprises with control of network access (1);250 or more;92,2 2. Total Construction (CNAE 41-43);G.1.G % of enterprises with a Virtual Private Network (1);Total;37,26 2. Total Construction (CNAE 41-43);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;34,55 2. Total Construction (CNAE 41-43);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;58,98 2. Total Construction (CNAE 41-43);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;94,7 2. Total Construction (CNAE 41-43);G.1.H % of enterprises with an ICT security monitoring system;Total;23,57 2. Total Construction (CNAE 41-43);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;21,43 2. Total Construction (CNAE 41-43);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;39,94 2. Total Construction (CNAE 41-43);G.1.H % of enterprises with an ICT security monitoring system;250 or more;77,6 2. Total Construction (CNAE 41-43);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;18,29 2. Total Construction (CNAE 41-43);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;15,57 2. Total Construction (CNAE 41-43);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;39,65 2. Total Construction (CNAE 41-43);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;80,96 2. Total Construction (CNAE 41-43);G.1.J % of enterprises with an ICT risk assessment (1);Total;12,25 2. Total Construction (CNAE 41-43);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;9,86 2. Total Construction (CNAE 41-43);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;30,93 2. Total Construction (CNAE 41-43);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;68,04 2. Total Construction (CNAE 41-43);G.1.K % of enterprises with an ICT security test (1);Total;18,48 2. Total Construction (CNAE 41-43);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;16,6 2. Total Construction (CNAE 41-43);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;32,03 2. Total Construction (CNAE 41-43);G.1.K % of enterprises with an ICT security test (1);250 or more;73,99 2. Total Construction (CNAE 41-43);G.2.A % of enterprises with voluntary ICT security training;Total;29,61 2. Total Construction (CNAE 41-43);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;27,88 2. Total Construction (CNAE 41-43);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;44,4 2. Total Construction (CNAE 41-43);G.2.A % of enterprises with voluntary ICT security training;250 or more;73,84 2. Total Construction (CNAE 41-43);G.2.B % of enterprises with obligations training on ICT security;Total;11,33 2. Total Construction (CNAE 41-43);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;9,97 2. Total Construction (CNAE 41-43);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;22,15 2. Total Construction (CNAE 41-43);G.2.B % of enterprises with obligations training on ICT security;250 or more;54,52 2. Total Construction (CNAE 41-43);G.2.C % of enterprises with ICT security obligations by contract;Total;13,08 2. Total Construction (CNAE 41-43);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;11,99 2. Total Construction (CNAE 41-43);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;22,58 2. Total Construction (CNAE 41-43);G.2.C % of enterprises with ICT security obligations by contract;250 or more;38,39 2. Total Construction (CNAE 41-43);G.3 % of enterprises with ICT security documentation;Total;14,29 2. Total Construction (CNAE 41-43);G.3 % of enterprises with ICT security documentation;From 10 to 49;12,53 2. Total Construction (CNAE 41-43);G.3 % of enterprises with ICT security documentation;From 50 to 249;28,53 2. Total Construction (CNAE 41-43);G.3 % of enterprises with ICT security documentation;250 or more;68,06 2. Total Construction (CNAE 41-43);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;68,42 2. Total Construction (CNAE 41-43);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;68,18 2. Total Construction (CNAE 41-43);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;66,62 2. Total Construction (CNAE 41-43);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;82,25 2. Total Construction (CNAE 41-43);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;21,03 2. Total Construction (CNAE 41-43);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;22,13 2. Total Construction (CNAE 41-43);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;18,09 2. Total Construction (CNAE 41-43);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;10,5 2. Total Construction (CNAE 41-43);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;10,55 2. Total Construction (CNAE 41-43);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;9,69 2. Total Construction (CNAE 41-43);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;15,29 2. Total Construction (CNAE 41-43);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;7,25 2. Total Construction (CNAE 41-43);G.5 % of enterprises with a security incident;Total;11,87 2. Total Construction (CNAE 41-43);G.5 % of enterprises with a security incident;From 10 to 49;11,41 2. Total Construction (CNAE 41-43);G.5 % of enterprises with a security incident;From 50 to 249;15,43 2. Total Construction (CNAE 41-43);G.5 % of enterprises with a security incident;250 or more;27,64 2. Total Construction (CNAE 41-43);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;59,58 2. Total Construction (CNAE 41-43);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;56,53 2. Total Construction (CNAE 41-43);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;80,82 2. Total Construction (CNAE 41-43);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;78,87 2. Total Construction (CNAE 41-43);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;23,34 2. Total Construction (CNAE 41-43);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;22,98 2. Total Construction (CNAE 41-43);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;25,84 2. Total Construction (CNAE 41-43);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;25,59 2. Total Construction (CNAE 41-43);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;23,9 2. Total Construction (CNAE 41-43);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;24,76 2. Total Construction (CNAE 41-43);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;17,81 2. Total Construction (CNAE 41-43);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;19,23 2. Total Construction (CNAE 41-43);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;19,95 2. Total Construction (CNAE 41-43);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;19,49 2. Total Construction (CNAE 41-43);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;24,34 2. Total Construction (CNAE 41-43);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;15,14 2. Total Construction (CNAE 41-43);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;7,69 2. Total Construction (CNAE 41-43);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;6,79 2. Total Construction (CNAE 41-43);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;14,42 2. Total Construction (CNAE 41-43);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;10,45 2. Total Construction (CNAE 41-43);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;4,41 2. Total Construction (CNAE 41-43);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;3,43 2. Total Construction (CNAE 41-43);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;12,48 2. Total Construction (CNAE 41-43);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;2,72 2. Total Construction (CNAE 41-43);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;28,91 2. Total Construction (CNAE 41-43);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;27,74 2. Total Construction (CNAE 41-43);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;37,14 2. Total Construction (CNAE 41-43);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;77,33 2. Total Construction (CNAE 41-43);G.6.B % of enterprises whose ICT security is handled by external providers;Total;60,42 2. Total Construction (CNAE 41-43);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;59,67 2. Total Construction (CNAE 41-43);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;68,08 2. Total Construction (CNAE 41-43);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;65,92 2. Total Construction (CNAE 41-43);G.7 % of enterprises that have insurance against ICT security incidents;Total;13,54 2. Total Construction (CNAE 41-43);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;12,47 2. Total Construction (CNAE 41-43);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;23,74 2. Total Construction (CNAE 41-43);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;29,05 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1 % of enterprises that apply some ICT security measure;Total;90,82 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;89,97 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;93,92 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1 % of enterprises that apply some ICT security measure;250 or more;97,68 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.A % of enterprises with strong password authentication (1);Total;90,83 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;89,91 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;94,2 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.A % of enterprises with strong password authentication (1);250 or more;97,03 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.B % of enterprises with biometric authentication (1);Total;19,18 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;16,94 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;26,18 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.B % of enterprises with biometric authentication (1);250 or more;39,8 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;28,21 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;24,16 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;42,66 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;57,13 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.D % of enterprises with encryption techniques (1);Total;40,04 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;35,56 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;55,79 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.D % of enterprises with encryption techniques (1);250 or more;73,07 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.E % of enterprises with data backup in a separate location (1);Total;92,24 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;91,35 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;95,74 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.E % of enterprises with data backup in a separate location (1);250 or more;97,06 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.F % of enterprises with control of network access (1);Total;74,31 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.F % of enterprises with control of network access (1);From 10 to 49;71,36 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.F % of enterprises with control of network access (1);From 50 to 249;85,65 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.F % of enterprises with control of network access (1);250 or more;91,68 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.G % of enterprises with a Virtual Private Network (1);Total;57,48 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;52,26 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;77,16 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;89,67 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.H % of enterprises with an ICT security monitoring system;Total;45,7 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;40,83 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;63,51 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.H % of enterprises with an ICT security monitoring system;250 or more;78,26 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;43,99 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;38,93 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;62,2 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;79,29 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.J % of enterprises with an ICT risk assessment (1);Total;34,41 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;29,65 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;50,64 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;72,02 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.K % of enterprises with an ICT security test (1);Total;39,24 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;34,67 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;54,93 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.K % of enterprises with an ICT security test (1);250 or more;74,77 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.A % of enterprises with voluntary ICT security training;Total;46,56 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;43,03 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;59,26 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.A % of enterprises with voluntary ICT security training;250 or more;75,9 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.B % of enterprises with obligations training on ICT security;Total;23,9 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;20,62 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;35,27 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.B % of enterprises with obligations training on ICT security;250 or more;53,7 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.C % of enterprises with ICT security obligations by contract;Total;24,13 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;21,73 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;33,26 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.C % of enterprises with ICT security obligations by contract;250 or more;41,69 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.3 % of enterprises with ICT security documentation;Total;34,7 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.3 % of enterprises with ICT security documentation;From 10 to 49;30,99 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.3 % of enterprises with ICT security documentation;From 50 to 249;47,24 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.3 % of enterprises with ICT security documentation;250 or more;69,66 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;68,43 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;66,71 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;70,68 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;80,84 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;21,76 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;23,05 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;19,51 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;14,28 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;9,82 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;10,25 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;9,81 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;4,88 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5 % of enterprises with a security incident;Total;17,06 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5 % of enterprises with a security incident;From 10 to 49;15,38 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5 % of enterprises with a security incident;From 50 to 249;24,07 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5 % of enterprises with a security incident;250 or more;26,52 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;77,71 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;77,32 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;79,47 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;75,74 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;21,34 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;20,11 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;23,42 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;30,51 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;20,02 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;20,32 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;19,71 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;16,87 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;16,02 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;16,56 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;14,46 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;14,9 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;7,89 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;7,28 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;9,92 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;7,94 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;3,91 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;2,48 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;7,9 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;7,7 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;42,6 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;38,28 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;58,16 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;78,99 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.6.B % of enterprises whose ICT security is handled by external providers;Total;64,78 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;64,86 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;64,58 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;63,62 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.7 % of enterprises that have insurance against ICT security incidents;Total;23,97 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;21,47 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;33,06 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;44,54 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1 % of enterprises that apply some ICT security measure;Total;91,39 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;90,55 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;95,68 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1 % of enterprises that apply some ICT security measure;250 or more;97,23 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.A % of enterprises with strong password authentication (1);Total;89,4 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;88,89 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;91,64 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.A % of enterprises with strong password authentication (1);250 or more;94,15 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.B % of enterprises with biometric authentication (1);Total;16,61 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;14,4 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;25,77 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.B % of enterprises with biometric authentication (1);250 or more;39,55 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;22,9 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;19,39 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;38,63 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;52,79 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.D % of enterprises with encryption techniques (1);Total;33,7 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;29,64 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;51,28 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.D % of enterprises with encryption techniques (1);250 or more;72 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.E % of enterprises with data backup in a separate location (1);Total;92,73 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;92,07 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;95,93 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.E % of enterprises with data backup in a separate location (1);250 or more;96,67 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.F % of enterprises with control of network access (1);Total;73,45 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.F % of enterprises with control of network access (1);From 10 to 49;70,9 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.F % of enterprises with control of network access (1);From 50 to 249;85,08 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.F % of enterprises with control of network access (1);250 or more;93,99 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.G % of enterprises with a Virtual Private Network (1);Total;54,37 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;49,29 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;78,35 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;90,28 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.H % of enterprises with an ICT security monitoring system;Total;40,38 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;36,11 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;59,54 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.H % of enterprises with an ICT security monitoring system;250 or more;76,29 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;38,56 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;33,85 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;59,98 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;76,82 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.J % of enterprises with an ICT risk assessment (1);Total;27,8 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;23,91 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;43,88 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;68,76 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.K % of enterprises with an ICT security test (1);Total;32,25 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;28,37 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;48,73 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.K % of enterprises with an ICT security test (1);250 or more;70,75 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.A % of enterprises with voluntary ICT security training;Total;39,17 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;35,85 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;54,19 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.A % of enterprises with voluntary ICT security training;250 or more;73,7 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.B % of enterprises with obligations training on ICT security;Total;18,9 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;16,48 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;29,29 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.B % of enterprises with obligations training on ICT security;250 or more;47,43 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.C % of enterprises with ICT security obligations by contract;Total;19,13 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;16,85 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;30,08 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.C % of enterprises with ICT security obligations by contract;250 or more;39,17 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.3 % of enterprises with ICT security documentation;Total;26,96 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.3 % of enterprises with ICT security documentation;From 10 to 49;23,71 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.3 % of enterprises with ICT security documentation;From 50 to 249;41,19 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.3 % of enterprises with ICT security documentation;250 or more;63,71 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;65,52 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;64,72 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;66,04 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;74,83 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;23,93 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;24,8 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;22,44 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;17,46 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;10,55 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;10,48 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;11,52 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;7,71 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5 % of enterprises with a security incident;Total;15,02 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5 % of enterprises with a security incident;From 10 to 49;12,83 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5 % of enterprises with a security incident;From 50 to 249;27,07 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5 % of enterprises with a security incident;250 or more;24,84 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;76,42 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;76,46 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;75,9 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;79,03 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;22,6 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;22,77 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;21,94 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;23,64 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;16,18 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;15,48 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;18,33 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;15,8 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;19,03 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;20,15 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;16,54 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;13,58 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;6,47 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;5,21 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;9,77 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;9,37 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;3,24 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;0,66 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;10,29 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;7,06 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;37,36 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;33,24 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;55,47 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;83,38 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.6.B % of enterprises whose ICT security is handled by external providers;Total;70,5 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;70,55 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;70,92 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;65,89 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.7 % of enterprises that have insurance against ICT security incidents;Total;19,9 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;17,88 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;30,05 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;35,04 3.2. Transport and storage (CNAE 49-53);G.1 % of enterprises that apply some ICT security measure;Total;87,79 3.2. Transport and storage (CNAE 49-53);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;87,04 3.2. Transport and storage (CNAE 49-53);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;90,11 3.2. Transport and storage (CNAE 49-53);G.1 % of enterprises that apply some ICT security measure;250 or more;97,54 3.2. Transport and storage (CNAE 49-53);G.1.A % of enterprises with strong password authentication (1);Total;90,14 3.2. Transport and storage (CNAE 49-53);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;88,71 3.2. Transport and storage (CNAE 49-53);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;96,29 3.2. Transport and storage (CNAE 49-53);G.1.A % of enterprises with strong password authentication (1);250 or more;98,02 3.2. Transport and storage (CNAE 49-53);G.1.B % of enterprises with biometric authentication (1);Total;16,24 3.2. Transport and storage (CNAE 49-53);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;14,72 3.2. Transport and storage (CNAE 49-53);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;19,57 3.2. Transport and storage (CNAE 49-53);G.1.B % of enterprises with biometric authentication (1);250 or more;39,3 3.2. Transport and storage (CNAE 49-53);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;23,12 3.2. Transport and storage (CNAE 49-53);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;20,03 3.2. Transport and storage (CNAE 49-53);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;32,35 3.2. Transport and storage (CNAE 49-53);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;58,92 3.2. Transport and storage (CNAE 49-53);G.1.D % of enterprises with encryption techniques (1);Total;30,07 3.2. Transport and storage (CNAE 49-53);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;26,2 3.2. Transport and storage (CNAE 49-53);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;42,39 3.2. Transport and storage (CNAE 49-53);G.1.D % of enterprises with encryption techniques (1);250 or more;71,34 3.2. Transport and storage (CNAE 49-53);G.1.E % of enterprises with data backup in a separate location (1);Total;88,47 3.2. Transport and storage (CNAE 49-53);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;87,24 3.2. Transport and storage (CNAE 49-53);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;93,55 3.2. Transport and storage (CNAE 49-53);G.1.E % of enterprises with data backup in a separate location (1);250 or more;96,38 3.2. Transport and storage (CNAE 49-53);G.1.F % of enterprises with control of network access (1);Total;63,55 3.2. Transport and storage (CNAE 49-53);G.1.F % of enterprises with control of network access (1);From 10 to 49;58,89 3.2. Transport and storage (CNAE 49-53);G.1.F % of enterprises with control of network access (1);From 50 to 249;82,61 3.2. Transport and storage (CNAE 49-53);G.1.F % of enterprises with control of network access (1);250 or more;93,45 3.2. Transport and storage (CNAE 49-53);G.1.G % of enterprises with a Virtual Private Network (1);Total;49,54 3.2. Transport and storage (CNAE 49-53);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;43,94 3.2. Transport and storage (CNAE 49-53);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;71,39 3.2. Transport and storage (CNAE 49-53);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;90,35 3.2. Transport and storage (CNAE 49-53);G.1.H % of enterprises with an ICT security monitoring system;Total;37,91 3.2. Transport and storage (CNAE 49-53);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;32,68 3.2. Transport and storage (CNAE 49-53);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;57,21 3.2. Transport and storage (CNAE 49-53);G.1.H % of enterprises with an ICT security monitoring system;250 or more;81,18 3.2. Transport and storage (CNAE 49-53);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;33,68 3.2. Transport and storage (CNAE 49-53);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;27,61 3.2. Transport and storage (CNAE 49-53);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;55,79 3.2. Transport and storage (CNAE 49-53);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;85,11 3.2. Transport and storage (CNAE 49-53);G.1.J % of enterprises with an ICT risk assessment (1);Total;25,8 3.2. Transport and storage (CNAE 49-53);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;21,86 3.2. Transport and storage (CNAE 49-53);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;38 3.2. Transport and storage (CNAE 49-53);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;69,35 3.2. Transport and storage (CNAE 49-53);G.1.K % of enterprises with an ICT security test (1);Total;33,17 3.2. Transport and storage (CNAE 49-53);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;27,74 3.2. Transport and storage (CNAE 49-53);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;53,31 3.2. Transport and storage (CNAE 49-53);G.1.K % of enterprises with an ICT security test (1);250 or more;77,63 3.2. Transport and storage (CNAE 49-53);G.2.A % of enterprises with voluntary ICT security training;Total;40,65 3.2. Transport and storage (CNAE 49-53);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;38,4 3.2. Transport and storage (CNAE 49-53);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;47,16 3.2. Transport and storage (CNAE 49-53);G.2.A % of enterprises with voluntary ICT security training;250 or more;72,16 3.2. Transport and storage (CNAE 49-53);G.2.B % of enterprises with obligations training on ICT security;Total;17,54 3.2. Transport and storage (CNAE 49-53);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;15,35 3.2. Transport and storage (CNAE 49-53);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;23,53 3.2. Transport and storage (CNAE 49-53);G.2.B % of enterprises with obligations training on ICT security;250 or more;50,04 3.2. Transport and storage (CNAE 49-53);G.2.C % of enterprises with ICT security obligations by contract;Total;19,24 3.2. Transport and storage (CNAE 49-53);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;17,81 3.2. Transport and storage (CNAE 49-53);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;24,43 3.2. Transport and storage (CNAE 49-53);G.2.C % of enterprises with ICT security obligations by contract;250 or more;33,71 3.2. Transport and storage (CNAE 49-53);G.3 % of enterprises with ICT security documentation;Total;27,54 3.2. Transport and storage (CNAE 49-53);G.3 % of enterprises with ICT security documentation;From 10 to 49;24,35 3.2. Transport and storage (CNAE 49-53);G.3 % of enterprises with ICT security documentation;From 50 to 249;37,4 3.2. Transport and storage (CNAE 49-53);G.3 % of enterprises with ICT security documentation;250 or more;68,92 3.2. Transport and storage (CNAE 49-53);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;67,12 3.2. Transport and storage (CNAE 49-53);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;67,32 3.2. Transport and storage (CNAE 49-53);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;64,58 3.2. Transport and storage (CNAE 49-53);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;72,03 3.2. Transport and storage (CNAE 49-53);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;23,29 3.2. Transport and storage (CNAE 49-53);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;23,64 3.2. Transport and storage (CNAE 49-53);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;23,39 3.2. Transport and storage (CNAE 49-53);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;19,55 3.2. Transport and storage (CNAE 49-53);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;9,59 3.2. Transport and storage (CNAE 49-53);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;9,04 3.2. Transport and storage (CNAE 49-53);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;12,03 3.2. Transport and storage (CNAE 49-53);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;8,42 3.2. Transport and storage (CNAE 49-53);G.5 % of enterprises with a security incident;Total;12,85 3.2. Transport and storage (CNAE 49-53);G.5 % of enterprises with a security incident;From 10 to 49;11,6 3.2. Transport and storage (CNAE 49-53);G.5 % of enterprises with a security incident;From 50 to 249;16,3 3.2. Transport and storage (CNAE 49-53);G.5 % of enterprises with a security incident;250 or more;31,09 3.2. Transport and storage (CNAE 49-53);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;77,93 3.2. Transport and storage (CNAE 49-53);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;78,51 3.2. Transport and storage (CNAE 49-53);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;79,1 3.2. Transport and storage (CNAE 49-53);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;68,68 3.2. Transport and storage (CNAE 49-53);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;23,84 3.2. Transport and storage (CNAE 49-53);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;22,57 3.2. Transport and storage (CNAE 49-53);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;24,69 3.2. Transport and storage (CNAE 49-53);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;35,12 3.2. Transport and storage (CNAE 49-53);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;30,63 3.2. Transport and storage (CNAE 49-53);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;36,22 3.2. Transport and storage (CNAE 49-53);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;9,87 3.2. Transport and storage (CNAE 49-53);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;26,14 3.2. Transport and storage (CNAE 49-53);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;16,14 3.2. Transport and storage (CNAE 49-53);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;15,74 3.2. Transport and storage (CNAE 49-53);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;15,3 3.2. Transport and storage (CNAE 49-53);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;22,68 3.2. Transport and storage (CNAE 49-53);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;7,09 3.2. Transport and storage (CNAE 49-53);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;6,37 3.2. Transport and storage (CNAE 49-53);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;10,81 3.2. Transport and storage (CNAE 49-53);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;4,84 3.2. Transport and storage (CNAE 49-53);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;0,63 3.2. Transport and storage (CNAE 49-53);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;0 3.2. Transport and storage (CNAE 49-53);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;2,06 3.2. Transport and storage (CNAE 49-53);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;3,63 3.2. Transport and storage (CNAE 49-53);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;35,3 3.2. Transport and storage (CNAE 49-53);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;31,67 3.2. Transport and storage (CNAE 49-53);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;46,51 3.2. Transport and storage (CNAE 49-53);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;82,51 3.2. Transport and storage (CNAE 49-53);G.6.B % of enterprises whose ICT security is handled by external providers;Total;64,34 3.2. Transport and storage (CNAE 49-53);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;63,72 3.2. Transport and storage (CNAE 49-53);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;66,83 3.2. Transport and storage (CNAE 49-53);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;69,62 3.2. Transport and storage (CNAE 49-53);G.7 % of enterprises that have insurance against ICT security incidents;Total;19,32 3.2. Transport and storage (CNAE 49-53);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;17,85 3.2. Transport and storage (CNAE 49-53);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;23,41 3.2. Transport and storage (CNAE 49-53);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;40,73 3.3. Accommodation services (CNAE 55);G.1 % of enterprises that apply some ICT security measure;Total;95,95 3.3. Accommodation services (CNAE 55);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;94,96 3.3. Accommodation services (CNAE 55);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;99,51 3.3. Accommodation services (CNAE 55);G.1 % of enterprises that apply some ICT security measure;250 or more;98,9 3.3. Accommodation services (CNAE 55);G.1.A % of enterprises with strong password authentication (1);Total;93,63 3.3. Accommodation services (CNAE 55);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;92,8 3.3. Accommodation services (CNAE 55);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;96,26 3.3. Accommodation services (CNAE 55);G.1.A % of enterprises with strong password authentication (1);250 or more;97,61 3.3. Accommodation services (CNAE 55);G.1.B % of enterprises with biometric authentication (1);Total;23,91 3.3. Accommodation services (CNAE 55);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;19,01 3.3. Accommodation services (CNAE 55);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;39,32 3.3. Accommodation services (CNAE 55);G.1.B % of enterprises with biometric authentication (1);250 or more;47,87 3.3. Accommodation services (CNAE 55);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;23,37 3.3. Accommodation services (CNAE 55);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;17,79 3.3. Accommodation services (CNAE 55);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;41,07 3.3. Accommodation services (CNAE 55);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;49,51 3.3. Accommodation services (CNAE 55);G.1.D % of enterprises with encryption techniques (1);Total;38,37 3.3. Accommodation services (CNAE 55);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;32,4 3.3. Accommodation services (CNAE 55);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;57,7 3.3. Accommodation services (CNAE 55);G.1.D % of enterprises with encryption techniques (1);250 or more;64,07 3.3. Accommodation services (CNAE 55);G.1.E % of enterprises with data backup in a separate location (1);Total;91,02 3.3. Accommodation services (CNAE 55);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;89,89 3.3. Accommodation services (CNAE 55);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;94,12 3.3. Accommodation services (CNAE 55);G.1.E % of enterprises with data backup in a separate location (1);250 or more;100 3.3. Accommodation services (CNAE 55);G.1.F % of enterprises with control of network access (1);Total;74,24 3.3. Accommodation services (CNAE 55);G.1.F % of enterprises with control of network access (1);From 10 to 49;69,95 3.3. Accommodation services (CNAE 55);G.1.F % of enterprises with control of network access (1);From 50 to 249;88,11 3.3. Accommodation services (CNAE 55);G.1.F % of enterprises with control of network access (1);250 or more;92,73 3.3. Accommodation services (CNAE 55);G.1.G % of enterprises with a Virtual Private Network (1);Total;53,06 3.3. Accommodation services (CNAE 55);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;42,79 3.3. Accommodation services (CNAE 55);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;86,48 3.3. Accommodation services (CNAE 55);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;95,51 3.3. Accommodation services (CNAE 55);G.1.H % of enterprises with an ICT security monitoring system;Total;44,72 3.3. Accommodation services (CNAE 55);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;37,75 3.3. Accommodation services (CNAE 55);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;66,36 3.3. Accommodation services (CNAE 55);G.1.H % of enterprises with an ICT security monitoring system;250 or more;80,75 3.3. Accommodation services (CNAE 55);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;42,79 3.3. Accommodation services (CNAE 55);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;35,18 3.3. Accommodation services (CNAE 55);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;65,81 3.3. Accommodation services (CNAE 55);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;86,61 3.3. Accommodation services (CNAE 55);G.1.J % of enterprises with an ICT risk assessment (1);Total;31,2 3.3. Accommodation services (CNAE 55);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;25,12 3.3. Accommodation services (CNAE 55);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;48,6 3.3. Accommodation services (CNAE 55);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;73,07 3.3. Accommodation services (CNAE 55);G.1.K % of enterprises with an ICT security test (1);Total;34,42 3.3. Accommodation services (CNAE 55);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;27,31 3.3. Accommodation services (CNAE 55);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;56,47 3.3. Accommodation services (CNAE 55);G.1.K % of enterprises with an ICT security test (1);250 or more;71,55 3.3. Accommodation services (CNAE 55);G.2.A % of enterprises with voluntary ICT security training;Total;50,12 3.3. Accommodation services (CNAE 55);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;47,46 3.3. Accommodation services (CNAE 55);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;58,13 3.3. Accommodation services (CNAE 55);G.2.A % of enterprises with voluntary ICT security training;250 or more;69,09 3.3. Accommodation services (CNAE 55);G.2.B % of enterprises with obligations training on ICT security;Total;21,7 3.3. Accommodation services (CNAE 55);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;18,17 3.3. Accommodation services (CNAE 55);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;32,66 3.3. Accommodation services (CNAE 55);G.2.B % of enterprises with obligations training on ICT security;250 or more;44,2 3.3. Accommodation services (CNAE 55);G.2.C % of enterprises with ICT security obligations by contract;Total;24,88 3.3. Accommodation services (CNAE 55);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;21,68 3.3. Accommodation services (CNAE 55);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;35,07 3.3. Accommodation services (CNAE 55);G.2.C % of enterprises with ICT security obligations by contract;250 or more;43,51 3.3. Accommodation services (CNAE 55);G.3 % of enterprises with ICT security documentation;Total;29,37 3.3. Accommodation services (CNAE 55);G.3 % of enterprises with ICT security documentation;From 10 to 49;24,93 3.3. Accommodation services (CNAE 55);G.3 % of enterprises with ICT security documentation;From 50 to 249;42,64 3.3. Accommodation services (CNAE 55);G.3 % of enterprises with ICT security documentation;250 or more;61,39 3.3. Accommodation services (CNAE 55);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;57,28 3.3. Accommodation services (CNAE 55);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;54,31 3.3. Accommodation services (CNAE 55);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;61,27 3.3. Accommodation services (CNAE 55);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;71,88 3.3. Accommodation services (CNAE 55);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;28,19 3.3. Accommodation services (CNAE 55);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;28,85 3.3. Accommodation services (CNAE 55);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;27,41 3.3. Accommodation services (CNAE 55);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;24,5 3.3. Accommodation services (CNAE 55);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;14,52 3.3. Accommodation services (CNAE 55);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;16,84 3.3. Accommodation services (CNAE 55);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;11,31 3.3. Accommodation services (CNAE 55);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;3,62 3.3. Accommodation services (CNAE 55);G.5 % of enterprises with a security incident;Total;19,87 3.3. Accommodation services (CNAE 55);G.5 % of enterprises with a security incident;From 10 to 49;17,58 3.3. Accommodation services (CNAE 55);G.5 % of enterprises with a security incident;From 50 to 249;28,01 3.3. Accommodation services (CNAE 55);G.5 % of enterprises with a security incident;250 or more;27,29 3.3. Accommodation services (CNAE 55);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;80,65 3.3. Accommodation services (CNAE 55);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;85,33 3.3. Accommodation services (CNAE 55);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;70 3.3. Accommodation services (CNAE 55);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;72,1 3.3. Accommodation services (CNAE 55);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;21,74 3.3. Accommodation services (CNAE 55);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;18,78 3.3. Accommodation services (CNAE 55);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;28,37 3.3. Accommodation services (CNAE 55);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;27,9 3.3. Accommodation services (CNAE 55);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;25,8 3.3. Accommodation services (CNAE 55);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;23,78 3.3. Accommodation services (CNAE 55);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;32,12 3.3. Accommodation services (CNAE 55);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;17,25 3.3. Accommodation services (CNAE 55);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;14,03 3.3. Accommodation services (CNAE 55);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;11,95 3.3. Accommodation services (CNAE 55);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;18,99 3.3. Accommodation services (CNAE 55);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;16,34 3.3. Accommodation services (CNAE 55);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;7,01 3.3. Accommodation services (CNAE 55);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;4,16 3.3. Accommodation services (CNAE 55);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;13,59 3.3. Accommodation services (CNAE 55);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;11,57 3.3. Accommodation services (CNAE 55);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;6,45 3.3. Accommodation services (CNAE 55);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;4,16 3.3. Accommodation services (CNAE 55);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;11,53 3.3. Accommodation services (CNAE 55);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;11,57 3.3. Accommodation services (CNAE 55);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;33,63 3.3. Accommodation services (CNAE 55);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;26,07 3.3. Accommodation services (CNAE 55);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;56,32 3.3. Accommodation services (CNAE 55);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;88,03 3.3. Accommodation services (CNAE 55);G.6.B % of enterprises whose ICT security is handled by external providers;Total;75,69 3.3. Accommodation services (CNAE 55);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;76,25 3.3. Accommodation services (CNAE 55);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;74,51 3.3. Accommodation services (CNAE 55);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;68,06 3.3. Accommodation services (CNAE 55);G.7 % of enterprises that have insurance against ICT security incidents;Total;26,11 3.3. Accommodation services (CNAE 55);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;23,63 3.3. Accommodation services (CNAE 55);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;33,1 3.3. Accommodation services (CNAE 55);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;47,03 3.4. Information and communications (CNAE 58-63);G.1 % of enterprises that apply some ICT security measure;Total;96,09 3.4. Information and communications (CNAE 58-63);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;95,2 3.4. Information and communications (CNAE 58-63);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;98,74 3.4. Information and communications (CNAE 58-63);G.1 % of enterprises that apply some ICT security measure;250 or more;99,64 3.4. Information and communications (CNAE 58-63);G.1.A % of enterprises with strong password authentication (1);Total;97,58 3.4. Information and communications (CNAE 58-63);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;97,4 3.4. Information and communications (CNAE 58-63);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;97,98 3.4. Information and communications (CNAE 58-63);G.1.A % of enterprises with strong password authentication (1);250 or more;98,68 3.4. Information and communications (CNAE 58-63);G.1.B % of enterprises with biometric authentication (1);Total;32,88 3.4. Information and communications (CNAE 58-63);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;31,09 3.4. Information and communications (CNAE 58-63);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;35,69 3.4. Information and communications (CNAE 58-63);G.1.B % of enterprises with biometric authentication (1);250 or more;49,14 3.4. Information and communications (CNAE 58-63);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;54,53 3.4. Information and communications (CNAE 58-63);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;50,42 3.4. Information and communications (CNAE 58-63);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;63,82 3.4. Information and communications (CNAE 58-63);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;80,29 3.4. Information and communications (CNAE 58-63);G.1.D % of enterprises with encryption techniques (1);Total;68,65 3.4. Information and communications (CNAE 58-63);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;64,22 3.4. Information and communications (CNAE 58-63);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;80,26 3.4. Information and communications (CNAE 58-63);G.1.D % of enterprises with encryption techniques (1);250 or more;90,11 3.4. Information and communications (CNAE 58-63);G.1.E % of enterprises with data backup in a separate location (1);Total;97,3 3.4. Information and communications (CNAE 58-63);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;97,19 3.4. Information and communications (CNAE 58-63);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;97,22 3.4. Information and communications (CNAE 58-63);G.1.E % of enterprises with data backup in a separate location (1);250 or more;99,28 3.4. Information and communications (CNAE 58-63);G.1.F % of enterprises with control of network access (1);Total;87,66 3.4. Information and communications (CNAE 58-63);G.1.F % of enterprises with control of network access (1);From 10 to 49;85,97 3.4. Information and communications (CNAE 58-63);G.1.F % of enterprises with control of network access (1);From 50 to 249;91,92 3.4. Information and communications (CNAE 58-63);G.1.F % of enterprises with control of network access (1);250 or more;96,44 3.4. Information and communications (CNAE 58-63);G.1.G % of enterprises with a Virtual Private Network (1);Total;77,73 3.4. Information and communications (CNAE 58-63);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;72,18 3.4. Information and communications (CNAE 58-63);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;94,39 3.4. Information and communications (CNAE 58-63);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;96,36 3.4. Information and communications (CNAE 58-63);G.1.H % of enterprises with an ICT security monitoring system;Total;73,31 3.4. Information and communications (CNAE 58-63);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;70,11 3.4. Information and communications (CNAE 58-63);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;80,65 3.4. Information and communications (CNAE 58-63);G.1.H % of enterprises with an ICT security monitoring system;250 or more;92,99 3.4. Information and communications (CNAE 58-63);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;75,87 3.4. Information and communications (CNAE 58-63);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;72 3.4. Information and communications (CNAE 58-63);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;86,24 3.4. Information and communications (CNAE 58-63);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;93,7 3.4. Information and communications (CNAE 58-63);G.1.J % of enterprises with an ICT risk assessment (1);Total;65,64 3.4. Information and communications (CNAE 58-63);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;61,23 3.4. Information and communications (CNAE 58-63);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;76,16 3.4. Information and communications (CNAE 58-63);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;91,31 3.4. Information and communications (CNAE 58-63);G.1.K % of enterprises with an ICT security test (1);Total;67,2 3.4. Information and communications (CNAE 58-63);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;63,71 3.4. Information and communications (CNAE 58-63);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;74,29 3.4. Information and communications (CNAE 58-63);G.1.K % of enterprises with an ICT security test (1);250 or more;92,29 3.4. Information and communications (CNAE 58-63);G.2.A % of enterprises with voluntary ICT security training;Total;77,96 3.4. Information and communications (CNAE 58-63);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;75,72 3.4. Information and communications (CNAE 58-63);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;83,25 3.4. Information and communications (CNAE 58-63);G.2.A % of enterprises with voluntary ICT security training;250 or more;92,5 3.4. Information and communications (CNAE 58-63);G.2.B % of enterprises with obligations training on ICT security;Total;48,1 3.4. Information and communications (CNAE 58-63);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;42,39 3.4. Information and communications (CNAE 58-63);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;62,14 3.4. Information and communications (CNAE 58-63);G.2.B % of enterprises with obligations training on ICT security;250 or more;83,01 3.4. Information and communications (CNAE 58-63);G.2.C % of enterprises with ICT security obligations by contract;Total;48,05 3.4. Information and communications (CNAE 58-63);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;45,29 3.4. Information and communications (CNAE 58-63);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;56,17 3.4. Information and communications (CNAE 58-63);G.2.C % of enterprises with ICT security obligations by contract;250 or more;59,77 3.4. Information and communications (CNAE 58-63);G.3 % of enterprises with ICT security documentation;Total;66,9 3.4. Information and communications (CNAE 58-63);G.3 % of enterprises with ICT security documentation;From 10 to 49;62,75 3.4. Information and communications (CNAE 58-63);G.3 % of enterprises with ICT security documentation;From 50 to 249;78,02 3.4. Information and communications (CNAE 58-63);G.3 % of enterprises with ICT security documentation;250 or more;88,58 3.4. Information and communications (CNAE 58-63);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;78,47 3.4. Information and communications (CNAE 58-63);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;75,7 3.4. Information and communications (CNAE 58-63);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;83,48 3.4. Information and communications (CNAE 58-63);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;92,11 3.4. Information and communications (CNAE 58-63);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;15,65 3.4. Information and communications (CNAE 58-63);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;17,65 3.4. Information and communications (CNAE 58-63);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;12,05 3.4. Information and communications (CNAE 58-63);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;5,81 3.4. Information and communications (CNAE 58-63);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;5,88 3.4. Information and communications (CNAE 58-63);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;6,66 3.4. Information and communications (CNAE 58-63);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;4,47 3.4. Information and communications (CNAE 58-63);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;2,09 3.4. Information and communications (CNAE 58-63);G.5 % of enterprises with a security incident;Total;22,97 3.4. Information and communications (CNAE 58-63);G.5 % of enterprises with a security incident;From 10 to 49;21,64 3.4. Information and communications (CNAE 58-63);G.5 % of enterprises with a security incident;From 50 to 249;27,45 3.4. Information and communications (CNAE 58-63);G.5 % of enterprises with a security incident;250 or more;26,22 3.4. Information and communications (CNAE 58-63);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;80,19 3.4. Information and communications (CNAE 58-63);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;79,22 3.4. Information and communications (CNAE 58-63);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;85,04 3.4. Information and communications (CNAE 58-63);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;72,73 3.4. Information and communications (CNAE 58-63);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;19,7 3.4. Information and communications (CNAE 58-63);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;19,04 3.4. Information and communications (CNAE 58-63);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;19,71 3.4. Information and communications (CNAE 58-63);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;28,34 3.4. Information and communications (CNAE 58-63);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;20,85 3.4. Information and communications (CNAE 58-63);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;21,45 3.4. Information and communications (CNAE 58-63);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;18,73 3.4. Information and communications (CNAE 58-63);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;21,75 3.4. Information and communications (CNAE 58-63);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;10,23 3.4. Information and communications (CNAE 58-63);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;10,04 3.4. Information and communications (CNAE 58-63);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;8,84 3.4. Information and communications (CNAE 58-63);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;18,45 3.4. Information and communications (CNAE 58-63);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;8,27 3.4. Information and communications (CNAE 58-63);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;7,69 3.4. Information and communications (CNAE 58-63);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;10,57 3.4. Information and communications (CNAE 58-63);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;6,27 3.4. Information and communications (CNAE 58-63);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;6,23 3.4. Information and communications (CNAE 58-63);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;5,09 3.4. Information and communications (CNAE 58-63);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;9,58 3.4. Information and communications (CNAE 58-63);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;7,3 3.4. Information and communications (CNAE 58-63);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;79,83 3.4. Information and communications (CNAE 58-63);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;76,54 3.4. Information and communications (CNAE 58-63);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;89,51 3.4. Information and communications (CNAE 58-63);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;93,53 3.4. Information and communications (CNAE 58-63);G.6.B % of enterprises whose ICT security is handled by external providers;Total;38,91 3.4. Information and communications (CNAE 58-63);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;38,31 3.4. Information and communications (CNAE 58-63);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;39,89 3.4. Information and communications (CNAE 58-63);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;44,6 3.4. Information and communications (CNAE 58-63);G.7 % of enterprises that have insurance against ICT security incidents;Total;42,52 3.4. Information and communications (CNAE 58-63);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;38,35 3.4. Information and communications (CNAE 58-63);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;52,63 3.4. Information and communications (CNAE 58-63);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;68,52 3.5. Real estate activities (CNAE 68);G.1 % of enterprises that apply some ICT security measure;Total;95,63 3.5. Real estate activities (CNAE 68);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;95,68 3.5. Real estate activities (CNAE 68);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;94,46 3.5. Real estate activities (CNAE 68);G.1 % of enterprises that apply some ICT security measure;250 or more;100 3.5. Real estate activities (CNAE 68);G.1.A % of enterprises with strong password authentication (1);Total;87,94 3.5. Real estate activities (CNAE 68);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;86,67 3.5. Real estate activities (CNAE 68);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;100 3.5. Real estate activities (CNAE 68);G.1.A % of enterprises with strong password authentication (1);250 or more;100 3.5. Real estate activities (CNAE 68);G.1.B % of enterprises with biometric authentication (1);Total;18,18 3.5. Real estate activities (CNAE 68);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;17,27 3.5. Real estate activities (CNAE 68);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;24,97 3.5. Real estate activities (CNAE 68);G.1.B % of enterprises with biometric authentication (1);250 or more;37,5 3.5. Real estate activities (CNAE 68);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;27,8 3.5. Real estate activities (CNAE 68);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;23,07 3.5. Real estate activities (CNAE 68);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;69,12 3.5. Real estate activities (CNAE 68);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;93,75 3.5. Real estate activities (CNAE 68);G.1.D % of enterprises with encryption techniques (1);Total;36,89 3.5. Real estate activities (CNAE 68);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;34,09 3.5. Real estate activities (CNAE 68);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;58,13 3.5. Real estate activities (CNAE 68);G.1.D % of enterprises with encryption techniques (1);250 or more;93,75 3.5. Real estate activities (CNAE 68);G.1.E % of enterprises with data backup in a separate location (1);Total;91,31 3.5. Real estate activities (CNAE 68);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;90,49 3.5. Real estate activities (CNAE 68);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;100 3.5. Real estate activities (CNAE 68);G.1.E % of enterprises with data backup in a separate location (1);250 or more;93,75 3.5. Real estate activities (CNAE 68);G.1.F % of enterprises with control of network access (1);Total;71,66 3.5. Real estate activities (CNAE 68);G.1.F % of enterprises with control of network access (1);From 10 to 49;68,87 3.5. Real estate activities (CNAE 68);G.1.F % of enterprises with control of network access (1);From 50 to 249;100 3.5. Real estate activities (CNAE 68);G.1.F % of enterprises with control of network access (1);250 or more;87,5 3.5. Real estate activities (CNAE 68);G.1.G % of enterprises with a Virtual Private Network (1);Total;53,9 3.5. Real estate activities (CNAE 68);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;49,52 3.5. Real estate activities (CNAE 68);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;95,8 3.5. Real estate activities (CNAE 68);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;93,75 3.5. Real estate activities (CNAE 68);G.1.H % of enterprises with an ICT security monitoring system;Total;44,7 3.5. Real estate activities (CNAE 68);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;40,03 3.5. Real estate activities (CNAE 68);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;89,27 3.5. Real estate activities (CNAE 68);G.1.H % of enterprises with an ICT security monitoring system;250 or more;87,5 3.5. Real estate activities (CNAE 68);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;45,86 3.5. Real estate activities (CNAE 68);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;40,65 3.5. Real estate activities (CNAE 68);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;95,66 3.5. Real estate activities (CNAE 68);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;93,75 3.5. Real estate activities (CNAE 68);G.1.J % of enterprises with an ICT risk assessment (1);Total;34,98 3.5. Real estate activities (CNAE 68);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;31,46 3.5. Real estate activities (CNAE 68);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;66,22 3.5. Real estate activities (CNAE 68);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;81,25 3.5. Real estate activities (CNAE 68);G.1.K % of enterprises with an ICT security test (1);Total;41,31 3.5. Real estate activities (CNAE 68);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;37,66 3.5. Real estate activities (CNAE 68);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;73,94 3.5. Real estate activities (CNAE 68);G.1.K % of enterprises with an ICT security test (1);250 or more;87,5 3.5. Real estate activities (CNAE 68);G.2.A % of enterprises with voluntary ICT security training;Total;52,01 3.5. Real estate activities (CNAE 68);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;48,46 3.5. Real estate activities (CNAE 68);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;84,25 3.5. Real estate activities (CNAE 68);G.2.A % of enterprises with voluntary ICT security training;250 or more;93,75 3.5. Real estate activities (CNAE 68);G.2.B % of enterprises with obligations training on ICT security;Total;24,24 3.5. Real estate activities (CNAE 68);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;21,11 3.5. Real estate activities (CNAE 68);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;49,31 3.5. Real estate activities (CNAE 68);G.2.B % of enterprises with obligations training on ICT security;250 or more;81,25 3.5. Real estate activities (CNAE 68);G.2.C % of enterprises with ICT security obligations by contract;Total;23,49 3.5. Real estate activities (CNAE 68);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;22,6 3.5. Real estate activities (CNAE 68);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;25,83 3.5. Real estate activities (CNAE 68);G.2.C % of enterprises with ICT security obligations by contract;250 or more;68,75 3.5. Real estate activities (CNAE 68);G.3 % of enterprises with ICT security documentation;Total;35,4 3.5. Real estate activities (CNAE 68);G.3 % of enterprises with ICT security documentation;From 10 to 49;32,86 3.5. Real estate activities (CNAE 68);G.3 % of enterprises with ICT security documentation;From 50 to 249;55,9 3.5. Real estate activities (CNAE 68);G.3 % of enterprises with ICT security documentation;250 or more;81,25 3.5. Real estate activities (CNAE 68);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;55,1 3.5. Real estate activities (CNAE 68);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;50,42 3.5. Real estate activities (CNAE 68);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;80,19 3.5. Real estate activities (CNAE 68);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;76,92 3.5. Real estate activities (CNAE 68);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;37,07 3.5. Real estate activities (CNAE 68);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;40,26 3.5. Real estate activities (CNAE 68);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;19,81 3.5. Real estate activities (CNAE 68);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;23,08 3.5. Real estate activities (CNAE 68);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;7,83 3.5. Real estate activities (CNAE 68);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;9,33 3.5. Real estate activities (CNAE 68);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;0 3.5. Real estate activities (CNAE 68);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;0 3.5. Real estate activities (CNAE 68);G.5 % of enterprises with a security incident;Total;25,81 3.5. Real estate activities (CNAE 68);G.5 % of enterprises with a security incident;From 10 to 49;24,62 3.5. Real estate activities (CNAE 68);G.5 % of enterprises with a security incident;From 50 to 249;41,12 3.5. Real estate activities (CNAE 68);G.5 % of enterprises with a security incident;250 or more;12,5 3.5. Real estate activities (CNAE 68);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;83,18 3.5. Real estate activities (CNAE 68);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;85,42 3.5. Real estate activities (CNAE 68);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;70,07 3.5. Real estate activities (CNAE 68);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;50 3.5. Real estate activities (CNAE 68);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;30,4 3.5. Real estate activities (CNAE 68);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;30,15 3.5. Real estate activities (CNAE 68);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;33,58 3.5. Real estate activities (CNAE 68);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;0 3.5. Real estate activities (CNAE 68);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;5,17 3.5. Real estate activities (CNAE 68);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;4,76 3.5. Real estate activities (CNAE 68);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;5,56 3.5. Real estate activities (CNAE 68);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;50 3.5. Real estate activities (CNAE 68);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;1,85 3.5. Real estate activities (CNAE 68);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;1,21 3.5. Real estate activities (CNAE 68);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;6,18 3.5. Real estate activities (CNAE 68);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;0 3.5. Real estate activities (CNAE 68);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;4,47 3.5. Real estate activities (CNAE 68);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;4,8 3.5. Real estate activities (CNAE 68);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;2,53 3.5. Real estate activities (CNAE 68);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;0 3.5. Real estate activities (CNAE 68);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;0 3.5. Real estate activities (CNAE 68);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;0 3.5. Real estate activities (CNAE 68);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;0 3.5. Real estate activities (CNAE 68);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;0 3.5. Real estate activities (CNAE 68);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;35,96 3.5. Real estate activities (CNAE 68);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;32,53 3.5. Real estate activities (CNAE 68);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;64,11 3.5. Real estate activities (CNAE 68);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;93,75 3.5. Real estate activities (CNAE 68);G.6.B % of enterprises whose ICT security is handled by external providers;Total;74,55 3.5. Real estate activities (CNAE 68);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;74,47 3.5. Real estate activities (CNAE 68);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;75,35 3.5. Real estate activities (CNAE 68);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;75 3.5. Real estate activities (CNAE 68);G.7 % of enterprises that have insurance against ICT security incidents;Total;25,78 3.5. Real estate activities (CNAE 68);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;22,32 3.5. Real estate activities (CNAE 68);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;56,82 3.5. Real estate activities (CNAE 68);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;68,75 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1 % of enterprises that apply some ICT security measure;Total;97,18 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;97,23 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;96,4 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1 % of enterprises that apply some ICT security measure;250 or more;99,7 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.A % of enterprises with strong password authentication (1);Total;93,23 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;92,14 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;98,32 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.A % of enterprises with strong password authentication (1);250 or more;99,27 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.B % of enterprises with biometric authentication (1);Total;18,85 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;16,24 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;29,46 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.B % of enterprises with biometric authentication (1);250 or more;40,65 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;33,72 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;27,95 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;60,53 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;66,02 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.D % of enterprises with encryption techniques (1);Total;52,07 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;46,56 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;77,02 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.D % of enterprises with encryption techniques (1);250 or more;85,96 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.E % of enterprises with data backup in a separate location (1);Total;94,7 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;93,97 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;98,39 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.E % of enterprises with data backup in a separate location (1);250 or more;97,39 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.F % of enterprises with control of network access (1);Total;85,57 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.F % of enterprises with control of network access (1);From 10 to 49;83,29 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.F % of enterprises with control of network access (1);From 50 to 249;97,01 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.F % of enterprises with control of network access (1);250 or more;94,34 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.G % of enterprises with a Virtual Private Network (1);Total;72,84 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;69,27 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;88,45 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;97,54 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.H % of enterprises with an ICT security monitoring system;Total;55,08 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;49,23 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;82,02 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.H % of enterprises with an ICT security monitoring system;250 or more;88,92 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;56,51 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;51,62 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;77,39 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;92,85 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.J % of enterprises with an ICT risk assessment (1);Total;45,98 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;39,82 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;73,45 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;85,78 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.K % of enterprises with an ICT security test (1);Total;49,72 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;44,73 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;71,09 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.K % of enterprises with an ICT security test (1);250 or more;86,28 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.A % of enterprises with voluntary ICT security training;Total;62,11 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;57,9 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;81,36 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.A % of enterprises with voluntary ICT security training;250 or more;87 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.B % of enterprises with obligations training on ICT security;Total;33,6 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;28,67 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;55,24 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.B % of enterprises with obligations training on ICT security;250 or more;67,23 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.C % of enterprises with ICT security obligations by contract;Total;32,48 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;29,97 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;43,64 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.C % of enterprises with ICT security obligations by contract;250 or more;49,07 3.6. Professional, scientific and technical activities (CNAE 69-75);G.3 % of enterprises with ICT security documentation;Total;50,89 3.6. Professional, scientific and technical activities (CNAE 69-75);G.3 % of enterprises with ICT security documentation;From 10 to 49;46,67 3.6. Professional, scientific and technical activities (CNAE 69-75);G.3 % of enterprises with ICT security documentation;From 50 to 249;68,09 3.6. Professional, scientific and technical activities (CNAE 69-75);G.3 % of enterprises with ICT security documentation;250 or more;86,44 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;64,34 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;61,65 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;69,25 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;86,65 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;24,37 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;26,88 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;18 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;10,45 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;11,29 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;11,47 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;12,75 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;2,89 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5 % of enterprises with a security incident;Total;21,16 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5 % of enterprises with a security incident;From 10 to 49;20,02 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5 % of enterprises with a security incident;From 50 to 249;25,07 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5 % of enterprises with a security incident;250 or more;34,21 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;80,68 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;79,98 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;85 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;76,66 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;15,25 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;13,68 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;16,64 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;36,51 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;16,78 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;16,07 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;19,41 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;19,11 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;13,65 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;14,85 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;8,34 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;13,01 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;9,6 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;9,54 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;9,21 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;11,91 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;4,7 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;4,46 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;3,62 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;12,6 3.6. Professional, scientific and technical activities (CNAE 69-75);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;50,99 3.6. Professional, scientific and technical activities (CNAE 69-75);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;44,89 3.6. Professional, scientific and technical activities (CNAE 69-75);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;78,83 3.6. Professional, scientific and technical activities (CNAE 69-75);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;87,3 3.6. Professional, scientific and technical activities (CNAE 69-75);G.6.B % of enterprises whose ICT security is handled by external providers;Total;68,98 3.6. Professional, scientific and technical activities (CNAE 69-75);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;70,19 3.6. Professional, scientific and technical activities (CNAE 69-75);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;62,68 3.6. Professional, scientific and technical activities (CNAE 69-75);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;65,63 3.6. Professional, scientific and technical activities (CNAE 69-75);G.7 % of enterprises that have insurance against ICT security incidents;Total;32 3.6. Professional, scientific and technical activities (CNAE 69-75);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;29,34 3.6. Professional, scientific and technical activities (CNAE 69-75);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;42,23 3.6. Professional, scientific and technical activities (CNAE 69-75);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;57,5 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1 % of enterprises that apply some ICT security measure;Total;80,22 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;77,4 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;86,95 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1 % of enterprises that apply some ICT security measure;250 or more;95,84 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.A % of enterprises with strong password authentication (1);Total;87,5 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;85,67 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;90,89 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.A % of enterprises with strong password authentication (1);250 or more;97,31 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.B % of enterprises with biometric authentication (1);Total;19,28 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;18,35 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;18,15 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.B % of enterprises with biometric authentication (1);250 or more;33,78 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;26,19 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;24 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;28,36 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;44,19 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.D % of enterprises with encryption techniques (1);Total;34,82 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;31,31 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;39,49 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.D % of enterprises with encryption techniques (1);250 or more;59,66 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.E % of enterprises with data backup in a separate location (1);Total;88,52 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;86,28 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;94,03 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.E % of enterprises with data backup in a separate location (1);250 or more;96,08 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.F % of enterprises with control of network access (1);Total;64,19 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.F % of enterprises with control of network access (1);From 10 to 49;59,75 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.F % of enterprises with control of network access (1);From 50 to 249;73,52 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.F % of enterprises with control of network access (1);250 or more;84,3 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.G % of enterprises with a Virtual Private Network (1);Total;43,26 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;36,95 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;54,21 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;79,49 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.H % of enterprises with an ICT security monitoring system;Total;39,02 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;34,6 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;46,66 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.H % of enterprises with an ICT security monitoring system;250 or more;64,49 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;32,91 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;28,29 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;40,14 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;62,14 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.J % of enterprises with an ICT risk assessment (1);Total;27,75 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;22,44 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;36,95 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;58,34 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.K % of enterprises with an ICT security test (1);Total;35,16 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;31,17 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;40,86 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.K % of enterprises with an ICT security test (1);250 or more;62,2 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.A % of enterprises with voluntary ICT security training;Total;35,25 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;30,53 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;45,18 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.A % of enterprises with voluntary ICT security training;250 or more;66,12 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.B % of enterprises with obligations training on ICT security;Total;19,41 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;16,8 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;23,69 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.B % of enterprises with obligations training on ICT security;250 or more;40,84 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.C % of enterprises with ICT security obligations by contract;Total;19,08 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;16,76 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;24,05 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.C % of enterprises with ICT security obligations by contract;250 or more;33,98 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.3 % of enterprises with ICT security documentation;Total;27,56 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.3 % of enterprises with ICT security documentation;From 10 to 49;24,09 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.3 % of enterprises with ICT security documentation;From 50 to 249;32,64 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.3 % of enterprises with ICT security documentation;250 or more;58,49 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;77,27 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;77,45 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;74,86 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;81,07 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;13,6 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;11,56 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;18,73 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;15,09 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;9,14 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;10,99 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;6,41 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;3,83 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5 % of enterprises with a security incident;Total;16,49 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5 % of enterprises with a security incident;From 10 to 49;15,41 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5 % of enterprises with a security incident;From 50 to 249;19,15 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5 % of enterprises with a security incident;250 or more;22,14 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;72,59 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;68,37 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;83,98 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;78,46 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;24,56 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;21,09 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;32,93 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;32,58 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;25,94 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;28,08 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;25,3 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;6,72 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;19,7 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;21,09 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;18,09 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;11,01 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;9,97 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;10,76 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;9,06 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;5,05 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;4,5 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;3,39 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;7,4 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;6,29 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;36,81 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;34,98 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;37,87 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;58,96 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.6.B % of enterprises whose ICT security is handled by external providers;Total;55,6 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;53,05 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;62,84 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;65,42 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.7 % of enterprises that have insurance against ICT security incidents;Total;18,89 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;15,88 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;25,93 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;36,19 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1 % of enterprises that apply some ICT security measure;Total;98,43 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;98,03 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;99,73 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1 % of enterprises that apply some ICT security measure;250 or more;99,28 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.A % of enterprises with strong password authentication (1);Total;98,04 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;97,63 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;99,41 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.A % of enterprises with strong password authentication (1);250 or more;98,75 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.B % of enterprises with biometric authentication (1);Total;34,5 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;31,42 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;42,03 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.B % of enterprises with biometric authentication (1);250 or more;50,67 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;55,26 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;49,78 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;69,26 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;81,44 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.D % of enterprises with encryption techniques (1);Total;69,96 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;65,67 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;80,76 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.D % of enterprises with encryption techniques (1);250 or more;91,17 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.E % of enterprises with data backup in a separate location (1);Total;98,23 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;98,04 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;98,69 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.E % of enterprises with data backup in a separate location (1);250 or more;99,27 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.F % of enterprises with control of network access (1);Total;87,64 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.F % of enterprises with control of network access (1);From 10 to 49;86,19 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.F % of enterprises with control of network access (1);From 50 to 249;90,69 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.F % of enterprises with control of network access (1);250 or more;97,25 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.G % of enterprises with a Virtual Private Network (1);Total;79,8 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;75,22 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;92,76 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;96,68 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.H % of enterprises with an ICT security monitoring system;Total;74,35 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;71,84 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;79,1 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.H % of enterprises with an ICT security monitoring system;250 or more;93,02 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;72,7 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;68,04 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;84,98 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;93,51 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.J % of enterprises with an ICT risk assessment (1);Total;65 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;59,34 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;79,23 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;92,93 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.K % of enterprises with an ICT security test (1);Total;66,33 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;61,49 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;77,9 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.K % of enterprises with an ICT security test (1);250 or more;92,67 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.A % of enterprises with voluntary ICT security training;Total;77,49 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;74,07 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;86,94 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.A % of enterprises with voluntary ICT security training;250 or more;91,88 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.B % of enterprises with obligations training on ICT security;Total;50,08 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;43,57 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;65,77 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.B % of enterprises with obligations training on ICT security;250 or more;86,4 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.C % of enterprises with ICT security obligations by contract;Total;48,3 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;45,53 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;56,08 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.C % of enterprises with ICT security obligations by contract;250 or more;59,43 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.3 % of enterprises with ICT security documentation;Total;70,13 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.3 % of enterprises with ICT security documentation;From 10 to 49;65,57 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.3 % of enterprises with ICT security documentation;From 50 to 249;82,64 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.3 % of enterprises with ICT security documentation;250 or more;89,75 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;80,36 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;76,84 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;87,71 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;92,49 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;13,34 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;14,95 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;10,77 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;4,91 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;6,3 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;8,22 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;1,51 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;2,6 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5 % of enterprises with a security incident;Total;20,43 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5 % of enterprises with a security incident;From 10 to 49;18,03 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5 % of enterprises with a security incident;From 50 to 249;28,64 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5 % of enterprises with a security incident;250 or more;24,22 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;82,62 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;82,42 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;84,99 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;73,81 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;20,49 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;20,95 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;16,76 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;32,83 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;21,07 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;25,63 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;10,37 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;19,75 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;10,86 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;12,04 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;7,02 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;15,57 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;6,5 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;4,03 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;12,78 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;4,85 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;7,32 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;6,32 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;9,33 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;9,25 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;82,77 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;80,36 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;89,22 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;93,63 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.6.B % of enterprises whose ICT security is handled by external providers;Total;36,3 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;35,44 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;37,34 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;45,19 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.7 % of enterprises that have insurance against ICT security incidents;Total;45,14 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;40,75 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;55,42 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;70,76