Main variables Total H.1 % of enterprises that apply some ICT security measure (0) 58,7 H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1) 85,21 H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1) 21,56 H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1) 23,44 H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1) 26,53 H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1) 72,47 H.1.F % of enterprises applying network access control as an ICT security measure (1) 35,34 H.1.G % of enterprises applying VPN as an ICT security measure (1) 18,25 H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1) 15,21 H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1) 12,54 H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1) 9,54 H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1) 11,15 H.2 % of enterprises that make their employees aware of their ICT security obligations (1) 38,47 H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2) 79,28 H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2) 34,31 H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2) 25,63 H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0) 8,05 H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3) 66,04 H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3) 21,23 H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3) 12,73 H.5 % of enterprises that have experienced an ICT security incident (0) 4,57 H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4) 67,04 H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4) 18,85 H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4) 28,79 H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4) 13 H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4) 8,94 H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4) 5,12