Autonomous communities and cities;Main variables;Economic activity cluster;Total National total;L.1 % of enterprises with internal security systems;Total Enterprises;86,99 National total;L.1 % of enterprises with internal security systems;Industry;87,04 National total;L.1 % of enterprises with internal security systems;Construction;82,4 National total;L.1 % of enterprises with internal security systems;Services;87,97 National total;L.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;94,22 National total;L.1.A % of enterprises that apply strong password authentication (1);Industry;95,6 National total;L.1.A % of enterprises that apply strong password authentication (1);Construction;90,53 National total;L.1.A % of enterprises that apply strong password authentication (1);Services;94,37 National total;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;51,62 National total;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;51,58 National total;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;50,8 National total;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;51,81 National total;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;13,07 National total;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;13,76 National total;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;7,83 National total;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;13,84 National total;L.1.D % of enterprises that use external data backup (1);Total Enterprises;62,3 National total;L.1.D % of enterprises that use external data backup (1);Industry;58,13 National total;L.1.D % of enterprises that use external data backup (1);Construction;55,94 National total;L.1.D % of enterprises that use external data backup (1);Services;65,43 National total;L.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;41,13 National total;L.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;36,7 National total;L.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;31,8 National total;L.1.E % of enterprises that use protocols to analyze security incidents (1);Services;44,99 Andalucía;L.1 % of enterprises with internal security systems;Total Enterprises;85,85 Andalucía;L.1 % of enterprises with internal security systems;Industry;88,18 Andalucía;L.1 % of enterprises with internal security systems;Construction;83,07 Andalucía;L.1 % of enterprises with internal security systems;Services;85,78 Andalucía;L.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;94,11 Andalucía;L.1.A % of enterprises that apply strong password authentication (1);Industry;93,54 Andalucía;L.1.A % of enterprises that apply strong password authentication (1);Construction;90,01 Andalucía;L.1.A % of enterprises that apply strong password authentication (1);Services;95,39 Andalucía;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;51,86 Andalucía;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;62,66 Andalucía;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;46,06 Andalucía;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;49,43 Andalucía;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;11,01 Andalucía;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;14,98 Andalucía;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;4,17 Andalucía;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;11,35 Andalucía;L.1.D % of enterprises that use external data backup (1);Total Enterprises;52,16 Andalucía;L.1.D % of enterprises that use external data backup (1);Industry;43,05 Andalucía;L.1.D % of enterprises that use external data backup (1);Construction;41,02 Andalucía;L.1.D % of enterprises that use external data backup (1);Services;58,45 Andalucía;L.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;35,24 Andalucía;L.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;29,84 Andalucía;L.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;21,9 Andalucía;L.1.E % of enterprises that use protocols to analyze security incidents (1);Services;40,73 Aragón;L.1 % of enterprises with internal security systems;Total Enterprises;86,68 Aragón;L.1 % of enterprises with internal security systems;Industry;94,6 Aragón;L.1 % of enterprises with internal security systems;Construction;71,34 Aragón;L.1 % of enterprises with internal security systems;Services;85,19 Aragón;L.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;93,43 Aragón;L.1.A % of enterprises that apply strong password authentication (1);Industry;93,33 Aragón;L.1.A % of enterprises that apply strong password authentication (1);Construction;98,88 Aragón;L.1.A % of enterprises that apply strong password authentication (1);Services;92,4 Aragón;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;55,04 Aragón;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;67,48 Aragón;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;26,9 Aragón;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;51,68 Aragón;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;13,19 Aragón;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;16,73 Aragón;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;9,87 Aragón;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;11,27 Aragón;L.1.D % of enterprises that use external data backup (1);Total Enterprises;65 Aragón;L.1.D % of enterprises that use external data backup (1);Industry;64,34 Aragón;L.1.D % of enterprises that use external data backup (1);Construction;80,87 Aragón;L.1.D % of enterprises that use external data backup (1);Services;62,25 Aragón;L.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;41,71 Aragón;L.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;47,66 Aragón;L.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;35,94 Aragón;L.1.E % of enterprises that use protocols to analyze security incidents (1);Services;38,54 Asturias, Principado de;L.1 % of enterprises with internal security systems;Total Enterprises;89,35 Asturias, Principado de;L.1 % of enterprises with internal security systems;Industry;90,75 Asturias, Principado de;L.1 % of enterprises with internal security systems;Construction;87,99 Asturias, Principado de;L.1 % of enterprises with internal security systems;Services;88,99 Asturias, Principado de;L.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;95,87 Asturias, Principado de;L.1.A % of enterprises that apply strong password authentication (1);Industry;96,12 Asturias, Principado de;L.1.A % of enterprises that apply strong password authentication (1);Construction;100 Asturias, Principado de;L.1.A % of enterprises that apply strong password authentication (1);Services;94,7 Asturias, Principado de;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;43,88 Asturias, Principado de;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;45,09 Asturias, Principado de;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;33,89 Asturias, Principado de;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;45,79 Asturias, Principado de;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;8,28 Asturias, Principado de;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;4,54 Asturias, Principado de;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;2,84 Asturias, Principado de;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;11,62 Asturias, Principado de;L.1.D % of enterprises that use external data backup (1);Total Enterprises;65,19 Asturias, Principado de;L.1.D % of enterprises that use external data backup (1);Industry;63,96 Asturias, Principado de;L.1.D % of enterprises that use external data backup (1);Construction;68,69 Asturias, Principado de;L.1.D % of enterprises that use external data backup (1);Services;64,94 Asturias, Principado de;L.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;38,92 Asturias, Principado de;L.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;42,47 Asturias, Principado de;L.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;32,35 Asturias, Principado de;L.1.E % of enterprises that use protocols to analyze security incidents (1);Services;38,73 Balears, Illes;L.1 % of enterprises with internal security systems;Total Enterprises;87,47 Balears, Illes;L.1 % of enterprises with internal security systems;Industry;83,1 Balears, Illes;L.1 % of enterprises with internal security systems;Construction;72,14 Balears, Illes;L.1 % of enterprises with internal security systems;Services;92,97 Balears, Illes;L.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;93,29 Balears, Illes;L.1.A % of enterprises that apply strong password authentication (1);Industry;94,24 Balears, Illes;L.1.A % of enterprises that apply strong password authentication (1);Construction;95,34 Balears, Illes;L.1.A % of enterprises that apply strong password authentication (1);Services;92,65 Balears, Illes;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;50,22 Balears, Illes;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;59,12 Balears, Illes;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;44,5 Balears, Illes;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;50,1 Balears, Illes;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;10,41 Balears, Illes;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;9,5 Balears, Illes;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;0,33 Balears, Illes;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;12,95 Balears, Illes;L.1.D % of enterprises that use external data backup (1);Total Enterprises;58,83 Balears, Illes;L.1.D % of enterprises that use external data backup (1);Industry;54,56 Balears, Illes;L.1.D % of enterprises that use external data backup (1);Construction;54,6 Balears, Illes;L.1.D % of enterprises that use external data backup (1);Services;60,54 Balears, Illes;L.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;37,94 Balears, Illes;L.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;31,72 Balears, Illes;L.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;34,28 Balears, Illes;L.1.E % of enterprises that use protocols to analyze security incidents (1);Services;39,85 Canarias;L.1 % of enterprises with internal security systems;Total Enterprises;81,02 Canarias;L.1 % of enterprises with internal security systems;Industry;76,46 Canarias;L.1 % of enterprises with internal security systems;Construction;75,7 Canarias;L.1 % of enterprises with internal security systems;Services;82,87 Canarias;L.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;94,94 Canarias;L.1.A % of enterprises that apply strong password authentication (1);Industry;99 Canarias;L.1.A % of enterprises that apply strong password authentication (1);Construction;83,3 Canarias;L.1.A % of enterprises that apply strong password authentication (1);Services;96,43 Canarias;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;41,72 Canarias;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;36,21 Canarias;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;36,35 Canarias;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;43,58 Canarias;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;10,15 Canarias;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;22,05 Canarias;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;13,09 Canarias;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;7,72 Canarias;L.1.D % of enterprises that use external data backup (1);Total Enterprises;53,34 Canarias;L.1.D % of enterprises that use external data backup (1);Industry;62,82 Canarias;L.1.D % of enterprises that use external data backup (1);Construction;60,78 Canarias;L.1.D % of enterprises that use external data backup (1);Services;50,47 Canarias;L.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;42,86 Canarias;L.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;50,43 Canarias;L.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;50,46 Canarias;L.1.E % of enterprises that use protocols to analyze security incidents (1);Services;40,27 Cantabria;L.1 % of enterprises with internal security systems;Total Enterprises;80,87 Cantabria;L.1 % of enterprises with internal security systems;Industry;79,2 Cantabria;L.1 % of enterprises with internal security systems;Construction;80,19 Cantabria;L.1 % of enterprises with internal security systems;Services;82,09 Cantabria;L.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;93,77 Cantabria;L.1.A % of enterprises that apply strong password authentication (1);Industry;93,64 Cantabria;L.1.A % of enterprises that apply strong password authentication (1);Construction;83,5 Cantabria;L.1.A % of enterprises that apply strong password authentication (1);Services;96,76 Cantabria;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;54,07 Cantabria;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;53,61 Cantabria;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;67,25 Cantabria;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;50,6 Cantabria;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;9,6 Cantabria;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;7,69 Cantabria;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;21,38 Cantabria;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;7,38 Cantabria;L.1.D % of enterprises that use external data backup (1);Total Enterprises;58,17 Cantabria;L.1.D % of enterprises that use external data backup (1);Industry;57,42 Cantabria;L.1.D % of enterprises that use external data backup (1);Construction;67,11 Cantabria;L.1.D % of enterprises that use external data backup (1);Services;56,07 Cantabria;L.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;27,51 Cantabria;L.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;27,7 Cantabria;L.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;9,57 Cantabria;L.1.E % of enterprises that use protocols to analyze security incidents (1);Services;32,49 Castilla y León;L.1 % of enterprises with internal security systems;Total Enterprises;89,57 Castilla y León;L.1 % of enterprises with internal security systems;Industry;93,74 Castilla y León;L.1 % of enterprises with internal security systems;Construction;81,63 Castilla y León;L.1 % of enterprises with internal security systems;Services;89,03 Castilla y León;L.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;92,71 Castilla y León;L.1.A % of enterprises that apply strong password authentication (1);Industry;91,95 Castilla y León;L.1.A % of enterprises that apply strong password authentication (1);Construction;93,92 Castilla y León;L.1.A % of enterprises that apply strong password authentication (1);Services;92,91 Castilla y León;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;53,28 Castilla y León;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;58,18 Castilla y León;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;42,6 Castilla y León;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;52,61 Castilla y León;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;9,85 Castilla y León;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;7,59 Castilla y León;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;5,83 Castilla y León;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;12,18 Castilla y León;L.1.D % of enterprises that use external data backup (1);Total Enterprises;57,66 Castilla y León;L.1.D % of enterprises that use external data backup (1);Industry;52,5 Castilla y León;L.1.D % of enterprises that use external data backup (1);Construction;59,21 Castilla y León;L.1.D % of enterprises that use external data backup (1);Services;60,57 Castilla y León;L.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;39,5 Castilla y León;L.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;36,98 Castilla y León;L.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;30,7 Castilla y León;L.1.E % of enterprises that use protocols to analyze security incidents (1);Services;43,08 Castilla-La Mancha;L.1 % of enterprises with internal security systems;Total Enterprises;83,75 Castilla-La Mancha;L.1 % of enterprises with internal security systems;Industry;85,42 Castilla-La Mancha;L.1 % of enterprises with internal security systems;Construction;75,63 Castilla-La Mancha;L.1 % of enterprises with internal security systems;Services;85,32 Castilla-La Mancha;L.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;96,39 Castilla-La Mancha;L.1.A % of enterprises that apply strong password authentication (1);Industry;98,35 Castilla-La Mancha;L.1.A % of enterprises that apply strong password authentication (1);Construction;88,16 Castilla-La Mancha;L.1.A % of enterprises that apply strong password authentication (1);Services;97,43 Castilla-La Mancha;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;45,51 Castilla-La Mancha;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;43,77 Castilla-La Mancha;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;41,93 Castilla-La Mancha;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;48,14 Castilla-La Mancha;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;13,89 Castilla-La Mancha;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;8,78 Castilla-La Mancha;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;21,4 Castilla-La Mancha;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;15,73 Castilla-La Mancha;L.1.D % of enterprises that use external data backup (1);Total Enterprises;56,14 Castilla-La Mancha;L.1.D % of enterprises that use external data backup (1);Industry;49,08 Castilla-La Mancha;L.1.D % of enterprises that use external data backup (1);Construction;60,53 Castilla-La Mancha;L.1.D % of enterprises that use external data backup (1);Services;60,64 Castilla-La Mancha;L.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;35,53 Castilla-La Mancha;L.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;27,19 Castilla-La Mancha;L.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;50,78 Castilla-La Mancha;L.1.E % of enterprises that use protocols to analyze security incidents (1);Services;37,55 Cataluña;L.1 % of enterprises with internal security systems;Total Enterprises;89,21 Cataluña;L.1 % of enterprises with internal security systems;Industry;87,57 Cataluña;L.1 % of enterprises with internal security systems;Construction;86,18 Cataluña;L.1 % of enterprises with internal security systems;Services;90,45 Cataluña;L.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;94,12 Cataluña;L.1.A % of enterprises that apply strong password authentication (1);Industry;95,39 Cataluña;L.1.A % of enterprises that apply strong password authentication (1);Construction;89,4 Cataluña;L.1.A % of enterprises that apply strong password authentication (1);Services;94,32 Cataluña;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;52,47 Cataluña;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;50,35 Cataluña;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;60,2 Cataluña;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;52,17 Cataluña;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;16,05 Cataluña;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;17,51 Cataluña;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;6,12 Cataluña;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;16,98 Cataluña;L.1.D % of enterprises that use external data backup (1);Total Enterprises;69,02 Cataluña;L.1.D % of enterprises that use external data backup (1);Industry;66,29 Cataluña;L.1.D % of enterprises that use external data backup (1);Construction;59,03 Cataluña;L.1.D % of enterprises that use external data backup (1);Services;71,79 Cataluña;L.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;44,95 Cataluña;L.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;43,62 Cataluña;L.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;30,83 Cataluña;L.1.E % of enterprises that use protocols to analyze security incidents (1);Services;47,76 Comunitat Valenciana;L.1 % of enterprises with internal security systems;Total Enterprises;85,96 Comunitat Valenciana;L.1 % of enterprises with internal security systems;Industry;83,68 Comunitat Valenciana;L.1 % of enterprises with internal security systems;Construction;82,38 Comunitat Valenciana;L.1 % of enterprises with internal security systems;Services;88,12 Comunitat Valenciana;L.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;93,53 Comunitat Valenciana;L.1.A % of enterprises that apply strong password authentication (1);Industry;97,45 Comunitat Valenciana;L.1.A % of enterprises that apply strong password authentication (1);Construction;93,17 Comunitat Valenciana;L.1.A % of enterprises that apply strong password authentication (1);Services;91,27 Comunitat Valenciana;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;52,86 Comunitat Valenciana;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;48,13 Comunitat Valenciana;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;57,63 Comunitat Valenciana;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;54,76 Comunitat Valenciana;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;13,12 Comunitat Valenciana;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;14,68 Comunitat Valenciana;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;11,33 Comunitat Valenciana;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;12,54 Comunitat Valenciana;L.1.D % of enterprises that use external data backup (1);Total Enterprises;58,62 Comunitat Valenciana;L.1.D % of enterprises that use external data backup (1);Industry;52,95 Comunitat Valenciana;L.1.D % of enterprises that use external data backup (1);Construction;56,7 Comunitat Valenciana;L.1.D % of enterprises that use external data backup (1);Services;62,35 Comunitat Valenciana;L.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;35,05 Comunitat Valenciana;L.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;28,3 Comunitat Valenciana;L.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;30,55 Comunitat Valenciana;L.1.E % of enterprises that use protocols to analyze security incidents (1);Services;39,91 Extremadura;L.1 % of enterprises with internal security systems;Total Enterprises;77,05 Extremadura;L.1 % of enterprises with internal security systems;Industry;83,57 Extremadura;L.1 % of enterprises with internal security systems;Construction;73,65 Extremadura;L.1 % of enterprises with internal security systems;Services;74,96 Extremadura;L.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;96,44 Extremadura;L.1.A % of enterprises that apply strong password authentication (1);Industry;96,75 Extremadura;L.1.A % of enterprises that apply strong password authentication (1);Construction;92,71 Extremadura;L.1.A % of enterprises that apply strong password authentication (1);Services;97,4 Extremadura;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;43,27 Extremadura;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;33,96 Extremadura;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;25,36 Extremadura;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;53,71 Extremadura;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;12,64 Extremadura;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;21,1 Extremadura;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;2,4 Extremadura;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;11,19 Extremadura;L.1.D % of enterprises that use external data backup (1);Total Enterprises;47,36 Extremadura;L.1.D % of enterprises that use external data backup (1);Industry;41,15 Extremadura;L.1.D % of enterprises that use external data backup (1);Construction;74,64 Extremadura;L.1.D % of enterprises that use external data backup (1);Services;42,43 Extremadura;L.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;26,74 Extremadura;L.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;30,07 Extremadura;L.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;38,82 Extremadura;L.1.E % of enterprises that use protocols to analyze security incidents (1);Services;21,28 Galicia;L.1 % of enterprises with internal security systems;Total Enterprises;85,19 Galicia;L.1 % of enterprises with internal security systems;Industry;81,23 Galicia;L.1 % of enterprises with internal security systems;Construction;82,9 Galicia;L.1 % of enterprises with internal security systems;Services;87,97 Galicia;L.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;92,27 Galicia;L.1.A % of enterprises that apply strong password authentication (1);Industry;95,1 Galicia;L.1.A % of enterprises that apply strong password authentication (1);Construction;90,03 Galicia;L.1.A % of enterprises that apply strong password authentication (1);Services;91,42 Galicia;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;51,08 Galicia;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;49,23 Galicia;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;51,07 Galicia;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;52,01 Galicia;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;8,41 Galicia;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;6,79 Galicia;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;12,45 Galicia;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;8,18 Galicia;L.1.D % of enterprises that use external data backup (1);Total Enterprises;60,73 Galicia;L.1.D % of enterprises that use external data backup (1);Industry;61,06 Galicia;L.1.D % of enterprises that use external data backup (1);Construction;57,17 Galicia;L.1.D % of enterprises that use external data backup (1);Services;61,49 Galicia;L.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;38,34 Galicia;L.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;37,58 Galicia;L.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;33,74 Galicia;L.1.E % of enterprises that use protocols to analyze security incidents (1);Services;39,91 Madrid, Comunidad de;L.1 % of enterprises with internal security systems;Total Enterprises;88,99 Madrid, Comunidad de;L.1 % of enterprises with internal security systems;Industry;87,69 Madrid, Comunidad de;L.1 % of enterprises with internal security systems;Construction;88,62 Madrid, Comunidad de;L.1 % of enterprises with internal security systems;Services;89,34 Madrid, Comunidad de;L.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;95,35 Madrid, Comunidad de;L.1.A % of enterprises that apply strong password authentication (1);Industry;97,01 Madrid, Comunidad de;L.1.A % of enterprises that apply strong password authentication (1);Construction;89,61 Madrid, Comunidad de;L.1.A % of enterprises that apply strong password authentication (1);Services;96,02 Madrid, Comunidad de;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;54,05 Madrid, Comunidad de;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;48,58 Madrid, Comunidad de;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;61,78 Madrid, Comunidad de;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;53,82 Madrid, Comunidad de;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;15,88 Madrid, Comunidad de;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;16,18 Madrid, Comunidad de;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;9,33 Madrid, Comunidad de;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;16,98 Madrid, Comunidad de;L.1.D % of enterprises that use external data backup (1);Total Enterprises;71,96 Madrid, Comunidad de;L.1.D % of enterprises that use external data backup (1);Industry;68,9 Madrid, Comunidad de;L.1.D % of enterprises that use external data backup (1);Construction;55,3 Madrid, Comunidad de;L.1.D % of enterprises that use external data backup (1);Services;75,57 Madrid, Comunidad de;L.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;49,95 Madrid, Comunidad de;L.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;41,51 Madrid, Comunidad de;L.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;36,82 Madrid, Comunidad de;L.1.E % of enterprises that use protocols to analyze security incidents (1);Services;54,06 Murcia, Región de;L.1 % of enterprises with internal security systems;Total Enterprises;84,67 Murcia, Región de;L.1 % of enterprises with internal security systems;Industry;82,35 Murcia, Región de;L.1 % of enterprises with internal security systems;Construction;76,22 Murcia, Región de;L.1 % of enterprises with internal security systems;Services;87,81 Murcia, Región de;L.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;93,75 Murcia, Región de;L.1.A % of enterprises that apply strong password authentication (1);Industry;93,1 Murcia, Región de;L.1.A % of enterprises that apply strong password authentication (1);Construction;81,36 Murcia, Región de;L.1.A % of enterprises that apply strong password authentication (1);Services;96,54 Murcia, Región de;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;58,81 Murcia, Región de;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;48,88 Murcia, Región de;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;53,31 Murcia, Región de;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;64,69 Murcia, Región de;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;14,46 Murcia, Región de;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;17,24 Murcia, Región de;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;5,77 Murcia, Región de;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;14,86 Murcia, Región de;L.1.D % of enterprises that use external data backup (1);Total Enterprises;51,24 Murcia, Región de;L.1.D % of enterprises that use external data backup (1);Industry;54,53 Murcia, Región de;L.1.D % of enterprises that use external data backup (1);Construction;41,14 Murcia, Región de;L.1.D % of enterprises that use external data backup (1);Services;51,67 Murcia, Región de;L.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;36,62 Murcia, Región de;L.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;28,61 Murcia, Región de;L.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;24,39 Murcia, Región de;L.1.E % of enterprises that use protocols to analyze security incidents (1);Services;42,93 Navarra, Comunidad Foral de;L.1 % of enterprises with internal security systems;Total Enterprises;89,54 Navarra, Comunidad Foral de;L.1 % of enterprises with internal security systems;Industry;95,7 Navarra, Comunidad Foral de;L.1 % of enterprises with internal security systems;Construction;73,22 Navarra, Comunidad Foral de;L.1 % of enterprises with internal security systems;Services;87,79 Navarra, Comunidad Foral de;L.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;92,78 Navarra, Comunidad Foral de;L.1.A % of enterprises that apply strong password authentication (1);Industry;92,33 Navarra, Comunidad Foral de;L.1.A % of enterprises that apply strong password authentication (1);Construction;93,09 Navarra, Comunidad Foral de;L.1.A % of enterprises that apply strong password authentication (1);Services;93,18 Navarra, Comunidad Foral de;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;55,44 Navarra, Comunidad Foral de;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;50,21 Navarra, Comunidad Foral de;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;56,99 Navarra, Comunidad Foral de;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;60,55 Navarra, Comunidad Foral de;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;10,62 Navarra, Comunidad Foral de;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;8,8 Navarra, Comunidad Foral de;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;0 Navarra, Comunidad Foral de;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;14,75 Navarra, Comunidad Foral de;L.1.D % of enterprises that use external data backup (1);Total Enterprises;60,14 Navarra, Comunidad Foral de;L.1.D % of enterprises that use external data backup (1);Industry;65,69 Navarra, Comunidad Foral de;L.1.D % of enterprises that use external data backup (1);Construction;54,67 Navarra, Comunidad Foral de;L.1.D % of enterprises that use external data backup (1);Services;55,52 Navarra, Comunidad Foral de;L.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;45,01 Navarra, Comunidad Foral de;L.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;39,15 Navarra, Comunidad Foral de;L.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;43,15 Navarra, Comunidad Foral de;L.1.E % of enterprises that use protocols to analyze security incidents (1);Services;51,49 País Vasco;L.1 % of enterprises with internal security systems;Total Enterprises;87,39 País Vasco;L.1 % of enterprises with internal security systems;Industry;89,94 País Vasco;L.1 % of enterprises with internal security systems;Construction;81,59 País Vasco;L.1 % of enterprises with internal security systems;Services;86,59 País Vasco;L.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;94,67 País Vasco;L.1.A % of enterprises that apply strong password authentication (1);Industry;98,01 País Vasco;L.1.A % of enterprises that apply strong password authentication (1);Construction;93,25 País Vasco;L.1.A % of enterprises that apply strong password authentication (1);Services;92,15 País Vasco;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;46,24 País Vasco;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;52,03 País Vasco;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;31,16 País Vasco;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;44,46 País Vasco;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;9,69 País Vasco;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;10,19 País Vasco;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;2,58 País Vasco;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;10,73 País Vasco;L.1.D % of enterprises that use external data backup (1);Total Enterprises;61,24 País Vasco;L.1.D % of enterprises that use external data backup (1);Industry;55,2 País Vasco;L.1.D % of enterprises that use external data backup (1);Construction;60,52 País Vasco;L.1.D % of enterprises that use external data backup (1);Services;66,49 País Vasco;L.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;39,34 País Vasco;L.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;35,34 País Vasco;L.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;16,1 País Vasco;L.1.E % of enterprises that use protocols to analyze security incidents (1);Services;47,51 Rioja, La;L.1 % of enterprises with internal security systems;Total Enterprises;84,43 Rioja, La;L.1 % of enterprises with internal security systems;Industry;84,92 Rioja, La;L.1 % of enterprises with internal security systems;Construction;87,55 Rioja, La;L.1 % of enterprises with internal security systems;Services;83,11 Rioja, La;L.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;92,09 Rioja, La;L.1.A % of enterprises that apply strong password authentication (1);Industry;94,43 Rioja, La;L.1.A % of enterprises that apply strong password authentication (1);Construction;94,75 Rioja, La;L.1.A % of enterprises that apply strong password authentication (1);Services;88,43 Rioja, La;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;50,74 Rioja, La;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;49,55 Rioja, La;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;56,02 Rioja, La;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;51,01 Rioja, La;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;13,9 Rioja, La;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;11,98 Rioja, La;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;10,5 Rioja, La;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;17,18 Rioja, La;L.1.D % of enterprises that use external data backup (1);Total Enterprises;61,78 Rioja, La;L.1.D % of enterprises that use external data backup (1);Industry;58,7 Rioja, La;L.1.D % of enterprises that use external data backup (1);Construction;80,53 Rioja, La;L.1.D % of enterprises that use external data backup (1);Services;61,3 Rioja, La;L.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;40,22 Rioja, La;L.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;41,41 Rioja, La;L.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;36,76 Rioja, La;L.1.E % of enterprises that use protocols to analyze security incidents (1);Services;39,5 Ceuta;L.1 % of enterprises with internal security systems;Total Enterprises;88,35 Ceuta;L.1 % of enterprises with internal security systems;Industry;94,87 Ceuta;L.1 % of enterprises with internal security systems;Construction;75,76 Ceuta;L.1 % of enterprises with internal security systems;Services;89,39 Ceuta;L.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;89,98 Ceuta;L.1.A % of enterprises that apply strong password authentication (1);Industry;72,97 Ceuta;L.1.A % of enterprises that apply strong password authentication (1);Construction;100 Ceuta;L.1.A % of enterprises that apply strong password authentication (1);Services;92,74 Ceuta;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;42,57 Ceuta;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;51,35 Ceuta;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;92 Ceuta;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;31,23 Ceuta;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;5,51 Ceuta;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;10,81 Ceuta;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;0 Ceuta;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;5,08 Ceuta;L.1.D % of enterprises that use external data backup (1);Total Enterprises;57,6 Ceuta;L.1.D % of enterprises that use external data backup (1);Industry;75,68 Ceuta;L.1.D % of enterprises that use external data backup (1);Construction;84 Ceuta;L.1.D % of enterprises that use external data backup (1);Services;47,94 Ceuta;L.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;19,2 Ceuta;L.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;5,41 Ceuta;L.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;84 Ceuta;L.1.E % of enterprises that use protocols to analyze security incidents (1);Services;11,14 Melilla;L.1 % of enterprises with internal security systems;Total Enterprises;79,13 Melilla;L.1 % of enterprises with internal security systems;Industry;93,62 Melilla;L.1 % of enterprises with internal security systems;Construction;100 Melilla;L.1 % of enterprises with internal security systems;Services;72,71 Melilla;L.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;99,65 Melilla;L.1.A % of enterprises that apply strong password authentication (1);Industry;98,38 Melilla;L.1.A % of enterprises that apply strong password authentication (1);Construction;100 Melilla;L.1.A % of enterprises that apply strong password authentication (1);Services;99,67 Melilla;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;31,48 Melilla;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;12,34 Melilla;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;34,92 Melilla;L.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;32,35 Melilla;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;6,72 Melilla;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;2,27 Melilla;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;0 Melilla;L.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;9,5 Melilla;L.1.D % of enterprises that use external data backup (1);Total Enterprises;55,19 Melilla;L.1.D % of enterprises that use external data backup (1);Industry;73,7 Melilla;L.1.D % of enterprises that use external data backup (1);Construction;100 Melilla;L.1.D % of enterprises that use external data backup (1);Services;37,79 Melilla;L.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;42,35 Melilla;L.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;37,5 Melilla;L.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;65,08 Melilla;L.1.E % of enterprises that use protocols to analyze security incidents (1);Services;35,06