Activity grouping (except CNAE 56, 64-66 and 95.1);Main variables;Size of the enterprise;Total Total Enterprises;G.1 % of enterprises that apply some ICT security measure;Total;89,3 Total Enterprises;G.1 % of enterprises that apply some ICT security measure;From 10 to 49;88,06 Total Enterprises;G.1 % of enterprises that apply some ICT security measure;From 50 to 249;94,84 Total Enterprises;G.1 % of enterprises that apply some ICT security measure;250 or more;98,49 Total Enterprises;G.1.A % of enterprises with strong password authentication (1);Total;89,37 Total Enterprises;G.1.A % of enterprises with strong password authentication (1);From 10 to 49;88,09 Total Enterprises;G.1.A % of enterprises with strong password authentication (1);From 50 to 249;94,67 Total Enterprises;G.1.A % of enterprises with strong password authentication (1);250 or more;98,27 Total Enterprises;G.1.B % of enterprises with biometric authentication (1);Total;18,8 Total Enterprises;G.1.B % of enterprises with biometric authentication (1);From 10 to 49;15,77 Total Enterprises;G.1.B % of enterprises with biometric authentication (1);From 50 to 249;28,44 Total Enterprises;G.1.B % of enterprises with biometric authentication (1);250 or more;52,79 Total Enterprises;G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;25,32 Total Enterprises;G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;21,15 Total Enterprises;G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;39,56 Total Enterprises;G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;67,59 Total Enterprises;G.1.D % of enterprises with encryption techniques (1);Total;36,42 Total Enterprises;G.1.D % of enterprises with encryption techniques (1);From 10 to 49;31,81 Total Enterprises;G.1.D % of enterprises with encryption techniques (1);From 50 to 249;53 Total Enterprises;G.1.D % of enterprises with encryption techniques (1);250 or more;79,2 Total Enterprises;G.1.E % of enterprises with data backup in a separate location (1);Total;90,81 Total Enterprises;G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;89,6 Total Enterprises;G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;95,93 Total Enterprises;G.1.E % of enterprises with data backup in a separate location (1);250 or more;98,22 Total Enterprises;G.1.F % of enterprises with control of network access (1);Total;70,41 Total Enterprises;G.1.F % of enterprises with control of network access (1);From 10 to 49;66,71 Total Enterprises;G.1.F % of enterprises with control of network access (1);From 50 to 249;85,68 Total Enterprises;G.1.F % of enterprises with control of network access (1);250 or more;95,36 Total Enterprises;G.1.G % of enterprises with a Virtual Private Network (1);Total;50,43 Total Enterprises;G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;44,35 Total Enterprises;G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;75,21 Total Enterprises;G.1.G % of enterprises with a Virtual Private Network (1);250 or more;93,21 Total Enterprises;G.1.H % of enterprises with an ICT security monitoring system;Total;39,7 Total Enterprises;G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;34,26 Total Enterprises;G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;60,58 Total Enterprises;G.1.H % of enterprises with an ICT security monitoring system;250 or more;83,94 Total Enterprises;G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;36,42 Total Enterprises;G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;30,35 Total Enterprises;G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;59,91 Total Enterprises;G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;85,06 Total Enterprises;G.1.J % of enterprises with an ICT risk assessment (1);Total;28,43 Total Enterprises;G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;22,96 Total Enterprises;G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;48,6 Total Enterprises;G.1.J % of enterprises with an ICT risk assessment (1);250 or more;76,99 Total Enterprises;G.1.K % of enterprises with an ICT security test (1);Total;33,71 Total Enterprises;G.1.K % of enterprises with an ICT security test (1);From 10 to 49;28,47 Total Enterprises;G.1.K % of enterprises with an ICT security test (1);From 50 to 249;52,91 Total Enterprises;G.1.K % of enterprises with an ICT security test (1);250 or more;80,64 Total Enterprises;G.2.A % of enterprises with voluntary ICT security training;Total;41,63 Total Enterprises;G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;37,41 Total Enterprises;G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;58,56 Total Enterprises;G.2.A % of enterprises with voluntary ICT security training;250 or more;82,7 Total Enterprises;G.2.B % of enterprises with obligations training on ICT security;Total;20,13 Total Enterprises;G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;16,55 Total Enterprises;G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;33,07 Total Enterprises;G.2.B % of enterprises with obligations training on ICT security;250 or more;61,76 Total Enterprises;G.2.C % of enterprises with ICT security obligations by contract;Total;21,61 Total Enterprises;G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;18,5 Total Enterprises;G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;33,59 Total Enterprises;G.2.C % of enterprises with ICT security obligations by contract;250 or more;54,04 Total Enterprises;G.3 % of enterprises with ICT security documentation;Total;29,18 Total Enterprises;G.3 % of enterprises with ICT security documentation;From 10 to 49;24,77 Total Enterprises;G.3 % of enterprises with ICT security documentation;From 50 to 249;45,69 Total Enterprises;G.3 % of enterprises with ICT security documentation;250 or more;77,48 Total Enterprises;G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;63,98 Total Enterprises;G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;63,57 Total Enterprises;G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;64,81 Total Enterprises;G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;65,39 Total Enterprises;G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;23,1 Total Enterprises;G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;23,57 Total Enterprises;G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;21,82 Total Enterprises;G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;22,35 Total Enterprises;G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;12,92 Total Enterprises;G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;12,86 Total Enterprises;G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;13,38 Total Enterprises;G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;12,25 Total Enterprises;G.5 % of enterprises with a security incident;Total;16,91 Total Enterprises;G.5 % of enterprises with a security incident;From 10 to 49;14,49 Total Enterprises;G.5 % of enterprises with a security incident;From 50 to 249;26,36 Total Enterprises;G.5 % of enterprises with a security incident;250 or more;41,51 Total Enterprises;G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;75,12 Total Enterprises;G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;72,83 Total Enterprises;G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;81,12 Total Enterprises;G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;79,96 Total Enterprises;G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;23,2 Total Enterprises;G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;22,59 Total Enterprises;G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;22,26 Total Enterprises;G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;32,33 Total Enterprises;G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;21,46 Total Enterprises;G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;22,38 Total Enterprises;G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;18,63 Total Enterprises;G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;20,84 Total Enterprises;G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;17,27 Total Enterprises;G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;17,76 Total Enterprises;G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;14,86 Total Enterprises;G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;19,73 Total Enterprises;G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;8,38 Total Enterprises;G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;7,84 Total Enterprises;G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;9,69 Total Enterprises;G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;9,94 Total Enterprises;G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;3,8 Total Enterprises;G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;2,8 Total Enterprises;G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;5,92 Total Enterprises;G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;7,53 Total Enterprises;G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;39,16 Total Enterprises;G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;34,42 Total Enterprises;G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;58,01 Total Enterprises;G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;86,15 Total Enterprises;G.6.B % of enterprises whose ICT security is handled by external providers;Total;67,09 Total Enterprises;G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;65,81 Total Enterprises;G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;72,38 Total Enterprises;G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;79,01 Total Enterprises;G.7 % of enterprises that have insurance against ICT security incidents;Total;21,9 Total Enterprises;G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;18,96 Total Enterprises;G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;33,07 Total Enterprises;G.7 % of enterprises that have insurance against ICT security incidents;250 or more;53,52 1. Total Industry (CNAE 10-39);G.1 % of enterprises that apply some ICT security measure;Total;87,98 1. Total Industry (CNAE 10-39);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;86,16 1. Total Industry (CNAE 10-39);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;95,75 1. Total Industry (CNAE 10-39);G.1 % of enterprises that apply some ICT security measure;250 or more;99,24 1. Total Industry (CNAE 10-39);G.1.A % of enterprises with strong password authentication (1);Total;86,68 1. Total Industry (CNAE 10-39);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;84,54 1. Total Industry (CNAE 10-39);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;94,75 1. Total Industry (CNAE 10-39);G.1.A % of enterprises with strong password authentication (1);250 or more;99,17 1. Total Industry (CNAE 10-39);G.1.B % of enterprises with biometric authentication (1);Total;18,66 1. Total Industry (CNAE 10-39);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;14,71 1. Total Industry (CNAE 10-39);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;30,47 1. Total Industry (CNAE 10-39);G.1.B % of enterprises with biometric authentication (1);250 or more;54,92 1. Total Industry (CNAE 10-39);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;20,73 1. Total Industry (CNAE 10-39);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;15,34 1. Total Industry (CNAE 10-39);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;36,19 1. Total Industry (CNAE 10-39);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;73,17 1. Total Industry (CNAE 10-39);G.1.D % of enterprises with encryption techniques (1);Total;31,31 1. Total Industry (CNAE 10-39);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;25,65 1. Total Industry (CNAE 10-39);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;48,58 1. Total Industry (CNAE 10-39);G.1.D % of enterprises with encryption techniques (1);250 or more;81,78 1. Total Industry (CNAE 10-39);G.1.E % of enterprises with data backup in a separate location (1);Total;89,23 1. Total Industry (CNAE 10-39);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;87,66 1. Total Industry (CNAE 10-39);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;94,91 1. Total Industry (CNAE 10-39);G.1.E % of enterprises with data backup in a separate location (1);250 or more;99,32 1. Total Industry (CNAE 10-39);G.1.F % of enterprises with control of network access (1);Total;67,93 1. Total Industry (CNAE 10-39);G.1.F % of enterprises with control of network access (1);From 10 to 49;62,91 1. Total Industry (CNAE 10-39);G.1.F % of enterprises with control of network access (1);From 50 to 249;86,58 1. Total Industry (CNAE 10-39);G.1.F % of enterprises with control of network access (1);250 or more;97,91 1. Total Industry (CNAE 10-39);G.1.G % of enterprises with a Virtual Private Network (1);Total;45,29 1. Total Industry (CNAE 10-39);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;36,84 1. Total Industry (CNAE 10-39);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;76,43 1. Total Industry (CNAE 10-39);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;97,03 1. Total Industry (CNAE 10-39);G.1.H % of enterprises with an ICT security monitoring system;Total;36,14 1. Total Industry (CNAE 10-39);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;29,02 1. Total Industry (CNAE 10-39);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;60,62 1. Total Industry (CNAE 10-39);G.1.H % of enterprises with an ICT security monitoring system;250 or more;87,42 1. Total Industry (CNAE 10-39);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;31,29 1. Total Industry (CNAE 10-39);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;23,01 1. Total Industry (CNAE 10-39);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;59,88 1. Total Industry (CNAE 10-39);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;90,36 1. Total Industry (CNAE 10-39);G.1.J % of enterprises with an ICT risk assessment (1);Total;24,12 1. Total Industry (CNAE 10-39);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;16,75 1. Total Industry (CNAE 10-39);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;48,99 1. Total Industry (CNAE 10-39);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;79,33 1. Total Industry (CNAE 10-39);G.1.K % of enterprises with an ICT security test (1);Total;30,11 1. Total Industry (CNAE 10-39);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;23 1. Total Industry (CNAE 10-39);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;53,92 1. Total Industry (CNAE 10-39);G.1.K % of enterprises with an ICT security test (1);250 or more;84,11 1. Total Industry (CNAE 10-39);G.2.A % of enterprises with voluntary ICT security training;Total;36,7 1. Total Industry (CNAE 10-39);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;31,15 1. Total Industry (CNAE 10-39);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;56,94 1. Total Industry (CNAE 10-39);G.2.A % of enterprises with voluntary ICT security training;250 or more;87,4 1. Total Industry (CNAE 10-39);G.2.B % of enterprises with obligations training on ICT security;Total;16,27 1. Total Industry (CNAE 10-39);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;11,98 1. Total Industry (CNAE 10-39);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;30,19 1. Total Industry (CNAE 10-39);G.2.B % of enterprises with obligations training on ICT security;250 or more;63,13 1. Total Industry (CNAE 10-39);G.2.C % of enterprises with ICT security obligations by contract;Total;16,95 1. Total Industry (CNAE 10-39);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;13,53 1. Total Industry (CNAE 10-39);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;28,2 1. Total Industry (CNAE 10-39);G.2.C % of enterprises with ICT security obligations by contract;250 or more;53,61 1. Total Industry (CNAE 10-39);G.3 % of enterprises with ICT security documentation;Total;24,21 1. Total Industry (CNAE 10-39);G.3 % of enterprises with ICT security documentation;From 10 to 49;18,36 1. Total Industry (CNAE 10-39);G.3 % of enterprises with ICT security documentation;From 50 to 249;44,4 1. Total Industry (CNAE 10-39);G.3 % of enterprises with ICT security documentation;250 or more;82,74 1. Total Industry (CNAE 10-39);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;61,64 1. Total Industry (CNAE 10-39);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;59,84 1. Total Industry (CNAE 10-39);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;64,66 1. Total Industry (CNAE 10-39);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;64,47 1. Total Industry (CNAE 10-39);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;21,41 1. Total Industry (CNAE 10-39);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;20,82 1. Total Industry (CNAE 10-39);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;22,08 1. Total Industry (CNAE 10-39);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;23,18 1. Total Industry (CNAE 10-39);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;16,95 1. Total Industry (CNAE 10-39);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;19,34 1. Total Industry (CNAE 10-39);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;13,26 1. Total Industry (CNAE 10-39);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;12,34 1. Total Industry (CNAE 10-39);G.5 % of enterprises with a security incident;Total;15,75 1. Total Industry (CNAE 10-39);G.5 % of enterprises with a security incident;From 10 to 49;12,91 1. Total Industry (CNAE 10-39);G.5 % of enterprises with a security incident;From 50 to 249;25,5 1. Total Industry (CNAE 10-39);G.5 % of enterprises with a security incident;250 or more;44,4 1. Total Industry (CNAE 10-39);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;74,06 1. Total Industry (CNAE 10-39);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;70,81 1. Total Industry (CNAE 10-39);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;80,15 1. Total Industry (CNAE 10-39);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;82,38 1. Total Industry (CNAE 10-39);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;22,66 1. Total Industry (CNAE 10-39);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;23,6 1. Total Industry (CNAE 10-39);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;17,87 1. Total Industry (CNAE 10-39);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;28,3 1. Total Industry (CNAE 10-39);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;18,62 1. Total Industry (CNAE 10-39);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;20,09 1. Total Industry (CNAE 10-39);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;14 1. Total Industry (CNAE 10-39);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;19,83 1. Total Industry (CNAE 10-39);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;16,09 1. Total Industry (CNAE 10-39);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;18,3 1. Total Industry (CNAE 10-39);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;9,09 1. Total Industry (CNAE 10-39);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;17,91 1. Total Industry (CNAE 10-39);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;8,21 1. Total Industry (CNAE 10-39);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;7,91 1. Total Industry (CNAE 10-39);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;7,96 1. Total Industry (CNAE 10-39);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;11,13 1. Total Industry (CNAE 10-39);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;3,16 1. Total Industry (CNAE 10-39);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;2,91 1. Total Industry (CNAE 10-39);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;2,47 1. Total Industry (CNAE 10-39);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;6,89 1. Total Industry (CNAE 10-39);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;34,48 1. Total Industry (CNAE 10-39);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;28,16 1. Total Industry (CNAE 10-39);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;57,44 1. Total Industry (CNAE 10-39);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;92,32 1. Total Industry (CNAE 10-39);G.6.B % of enterprises whose ICT security is handled by external providers;Total;68,61 1. Total Industry (CNAE 10-39);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;66,91 1. Total Industry (CNAE 10-39);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;75,2 1. Total Industry (CNAE 10-39);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;82,21 1. Total Industry (CNAE 10-39);G.7 % of enterprises that have insurance against ICT security incidents;Total;19,25 1. Total Industry (CNAE 10-39);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;15,98 1. Total Industry (CNAE 10-39);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;29,97 1. Total Industry (CNAE 10-39);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;54,53 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1 % of enterprises that apply some ICT security measure;Total;83,52 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;81,56 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;94,26 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1 % of enterprises that apply some ICT security measure;250 or more;98,66 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.A % of enterprises with strong password authentication (1);Total;86,18 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;84,82 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;91,76 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.A % of enterprises with strong password authentication (1);250 or more;99,31 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.B % of enterprises with biometric authentication (1);Total;15,29 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;11,71 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;29,08 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.B % of enterprises with biometric authentication (1);250 or more;53,89 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;15,45 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;12,05 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;25,48 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;67,14 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.D % of enterprises with encryption techniques (1);Total;27,06 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;23,26 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;40,32 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.D % of enterprises with encryption techniques (1);250 or more;74,89 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.E % of enterprises with data backup in a separate location (1);Total;83,57 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;81,25 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;94,44 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.E % of enterprises with data backup in a separate location (1);250 or more;99,16 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.F % of enterprises with control of network access (1);Total;60,39 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.F % of enterprises with control of network access (1);From 10 to 49;55,71 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.F % of enterprises with control of network access (1);From 50 to 249;81,49 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.F % of enterprises with control of network access (1);250 or more;95,96 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.G % of enterprises with a Virtual Private Network (1);Total;35,96 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;29,4 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;63,79 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;94,27 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.H % of enterprises with an ICT security monitoring system;Total;29,86 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;24,26 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;53,16 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.H % of enterprises with an ICT security monitoring system;250 or more;81,98 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;25,05 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;18,67 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;51,08 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;86,59 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.J % of enterprises with an ICT risk assessment (1);Total;17,7 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;11,61 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;43,27 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;73,14 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.K % of enterprises with an ICT security test (1);Total;25,57 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;20,04 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;48,75 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.K % of enterprises with an ICT security test (1);250 or more;76,25 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.A % of enterprises with voluntary ICT security training;Total;34,73 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;31,31 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;49,31 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.A % of enterprises with voluntary ICT security training;250 or more;82,62 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.B % of enterprises with obligations training on ICT security;Total;13,81 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;11,18 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;24,88 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.B % of enterprises with obligations training on ICT security;250 or more;51,46 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.C % of enterprises with ICT security obligations by contract;Total;14,55 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;12,6 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;21,52 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.C % of enterprises with ICT security obligations by contract;250 or more;48,64 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.3 % of enterprises with ICT security documentation;Total;19,92 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.3 % of enterprises with ICT security documentation;From 10 to 49;16,32 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.3 % of enterprises with ICT security documentation;From 50 to 249;34,03 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.3 % of enterprises with ICT security documentation;250 or more;76,51 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;62,27 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;61,05 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;67,82 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;58,92 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;18,74 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;18,95 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;16,31 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;22,68 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;18,99 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;20 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;15,86 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;18,41 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5 % of enterprises with a security incident;Total;14,4 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5 % of enterprises with a security incident;From 10 to 49;11,77 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5 % of enterprises with a security incident;From 50 to 249;26,3 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5 % of enterprises with a security incident;250 or more;47,47 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;74,7 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;70,93 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;82,2 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;86,93 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;19,4 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;20,51 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;12,78 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;28,28 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;19,64 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;21,72 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;13,09 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;19,7 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;16,15 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;18,63 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;7,58 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;18,5 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;3,44 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;2,17 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;5,66 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;8,48 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;3,75 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;4,97 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;0 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;3,53 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;29,02 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;24,1 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;51,56 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;90,06 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.6.B % of enterprises whose ICT security is handled by external providers;Total;63,45 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;61,35 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;74,59 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;81,68 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.7 % of enterprises that have insurance against ICT security incidents;Total;17,35 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;15,3 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;25,58 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;48,65 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1 % of enterprises that apply some ICT security measure;Total;93,04 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;91,09 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;98,82 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1 % of enterprises that apply some ICT security measure;250 or more;99 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.A % of enterprises with strong password authentication (1);Total;89,01 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;86,01 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;96,47 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.A % of enterprises with strong password authentication (1);250 or more;100 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.B % of enterprises with biometric authentication (1);Total;29,57 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;24,26 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;40,35 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.B % of enterprises with biometric authentication (1);250 or more;57,51 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;25,95 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;15,77 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;47,4 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;77 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.D % of enterprises with encryption techniques (1);Total;37,35 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;26,54 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;61,51 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.D % of enterprises with encryption techniques (1);250 or more;86,71 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.E % of enterprises with data backup in a separate location (1);Total;93,09 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;91,56 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;96,54 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.E % of enterprises with data backup in a separate location (1);250 or more;100 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.F % of enterprises with control of network access (1);Total;74,36 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.F % of enterprises with control of network access (1);From 10 to 49;67,4 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.F % of enterprises with control of network access (1);From 50 to 249;91,91 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.F % of enterprises with control of network access (1);250 or more;99,2 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.G % of enterprises with a Virtual Private Network (1);Total;53,41 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;40,25 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;86,71 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;100 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.H % of enterprises with an ICT security monitoring system;Total;42,98 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;31,08 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;71,31 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.H % of enterprises with an ICT security monitoring system;250 or more;91,27 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;41,93 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;29,5 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;71,17 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;93,71 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.J % of enterprises with an ICT risk assessment (1);Total;36,74 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;26,89 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;58,56 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;82,39 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.K % of enterprises with an ICT security test (1);Total;38,11 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;25,71 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;67,08 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.K % of enterprises with an ICT security test (1);250 or more;90,26 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.A % of enterprises with voluntary ICT security training;Total;46,21 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;37,59 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;65,86 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.A % of enterprises with voluntary ICT security training;250 or more;93,34 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.B % of enterprises with obligations training on ICT security;Total;24,6 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;16,99 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;40,85 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.B % of enterprises with obligations training on ICT security;250 or more;69,97 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.C % of enterprises with ICT security obligations by contract;Total;24,03 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;16,7 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;40,82 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.C % of enterprises with ICT security obligations by contract;250 or more;63,8 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.3 % of enterprises with ICT security documentation;Total;32,44 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.3 % of enterprises with ICT security documentation;From 10 to 49;20,94 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.3 % of enterprises with ICT security documentation;From 50 to 249;59,96 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.3 % of enterprises with ICT security documentation;250 or more;90,8 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;61,62 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;62,73 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;58,09 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;66,28 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;23,27 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;16,74 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;31,13 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;25,42 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;15,11 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;20,53 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;10,78 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;8,3 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5 % of enterprises with a security incident;Total;20,49 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5 % of enterprises with a security incident;From 10 to 49;16,91 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5 % of enterprises with a security incident;From 50 to 249;27,87 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5 % of enterprises with a security incident;250 or more;42,83 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;78,96 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;80,99 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;75,76 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;75,5 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;31,02 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;34,04 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;25,52 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;27,52 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;15,44 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;13,73 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;21,02 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;11,86 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;11,69 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;10,48 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;11,45 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;18,61 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;11,54 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;12,25 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;6,55 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;19,05 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;3,53 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;1,62 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;5,73 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;8,69 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;40,35 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;30,79 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;62,08 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;92,82 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.6.B % of enterprises whose ICT security is handled by external providers;Total;78,58 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;76,86 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;82,59 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;87,68 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.7 % of enterprises that have insurance against ICT security incidents;Total;23,68 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;17,61 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;35,75 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;63 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1 % of enterprises that apply some ICT security measure;Total;87,75 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;86,32 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;95,66 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1 % of enterprises that apply some ICT security measure;250 or more;100 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.A % of enterprises with strong password authentication (1);Total;85,5 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;83,33 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;96,99 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.A % of enterprises with strong password authentication (1);250 or more;97,07 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.B % of enterprises with biometric authentication (1);Total;14,09 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;10,94 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;29,11 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.B % of enterprises with biometric authentication (1);250 or more;41,9 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;18,04 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;14,2 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;34,1 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;66,75 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.D % of enterprises with encryption techniques (1);Total;31,84 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;28,75 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;43,8 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.D % of enterprises with encryption techniques (1);250 or more;77,15 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.E % of enterprises with data backup in a separate location (1);Total;90,82 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;89,9 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;95,16 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.E % of enterprises with data backup in a separate location (1);250 or more;99,08 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.F % of enterprises with control of network access (1);Total;67,79 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.F % of enterprises with control of network access (1);From 10 to 49;64,23 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.F % of enterprises with control of network access (1);From 50 to 249;84,57 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.F % of enterprises with control of network access (1);250 or more;100 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.G % of enterprises with a Virtual Private Network (1);Total;44,98 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;38,58 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;76,46 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;94,61 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.H % of enterprises with an ICT security monitoring system;Total;34,96 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;29,52 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;60,2 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.H % of enterprises with an ICT security monitoring system;250 or more;86,84 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;25,3 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;18,26 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;58,8 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;87,33 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.J % of enterprises with an ICT risk assessment (1);Total;19,99 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;14,26 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;45,74 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;80,24 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.K % of enterprises with an ICT security test (1);Total;26,04 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;21,13 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;46,7 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.K % of enterprises with an ICT security test (1);250 or more;87,23 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.A % of enterprises with voluntary ICT security training;Total;29,93 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;25,73 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;50,9 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.A % of enterprises with voluntary ICT security training;250 or more;80,96 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.B % of enterprises with obligations training on ICT security;Total;12,73 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;9,94 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;24,82 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.B % of enterprises with obligations training on ICT security;250 or more;59,39 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.C % of enterprises with ICT security obligations by contract;Total;13,58 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;11,65 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;22,79 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.C % of enterprises with ICT security obligations by contract;250 or more;39,67 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.3 % of enterprises with ICT security documentation;Total;20,04 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.3 % of enterprises with ICT security documentation;From 10 to 49;17,13 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.3 % of enterprises with ICT security documentation;From 50 to 249;31,58 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.3 % of enterprises with ICT security documentation;250 or more;76,15 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;61,06 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;54,71 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;79,85 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;73,86 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;18,6 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;20,76 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;11,24 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;17,18 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;20,33 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;24,54 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;8,92 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;8,96 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5 % of enterprises with a security incident;Total;13,49 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5 % of enterprises with a security incident;From 10 to 49;11,6 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5 % of enterprises with a security incident;From 50 to 249;22,9 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5 % of enterprises with a security incident;250 or more;36,58 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;69,08 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;62,68 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;86,28 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;89,26 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;20,74 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;21,31 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;17,5 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;26,44 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;19,89 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;22,88 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;9,3 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;21,56 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;16,66 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;18,2 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;11,79 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;15,01 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;11,76 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;14,2 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;2,84 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;14,42 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;2,95 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;2,71 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;1,54 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;12,67 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;30,14 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;25,29 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;53,67 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;93,3 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.6.B % of enterprises whose ICT security is handled by external providers;Total;69,9 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;68,85 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;74,75 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;85,56 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.7 % of enterprises that have insurance against ICT security incidents;Total;18,82 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;15,24 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;38,19 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;51,6 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1 % of enterprises that apply some ICT security measure;Total;91,06 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;89,91 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;95,05 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1 % of enterprises that apply some ICT security measure;250 or more;99,57 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.A % of enterprises with strong password authentication (1);Total;85,26 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;82,54 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;95,17 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.A % of enterprises with strong password authentication (1);250 or more;98,73 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.B % of enterprises with biometric authentication (1);Total;19,4 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;16,34 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;25,39 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.B % of enterprises with biometric authentication (1);250 or more;57,44 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;24,68 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;18,71 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;40,63 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;80,44 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.D % of enterprises with encryption techniques (1);Total;30,84 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;24,1 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;50,65 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.D % of enterprises with encryption techniques (1);250 or more;85,59 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.E % of enterprises with data backup in a separate location (1);Total;94,26 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;93,88 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;95,02 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.E % of enterprises with data backup in a separate location (1);250 or more;99,06 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.F % of enterprises with control of network access (1);Total;73,29 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.F % of enterprises with control of network access (1);From 10 to 49;68,44 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.F % of enterprises with control of network access (1);From 50 to 249;90,84 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.F % of enterprises with control of network access (1);250 or more;97,93 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.G % of enterprises with a Virtual Private Network (1);Total;51,45 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;42,54 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;83,43 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;98,25 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.H % of enterprises with an ICT security monitoring system;Total;40,43 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;33,59 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;62,36 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.H % of enterprises with an ICT security monitoring system;250 or more;88,04 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;35,38 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;27 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;62,7 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;91,6 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.J % of enterprises with an ICT risk assessment (1);Total;25,92 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;18,16 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;50,03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;83,1 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.K % of enterprises with an ICT security test (1);Total;32,2 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;25,13 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;53,81 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.K % of enterprises with an ICT security test (1);250 or more;85,81 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.A % of enterprises with voluntary ICT security training;Total;36,72 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;29,12 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;63,55 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.A % of enterprises with voluntary ICT security training;250 or more;90,08 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.B % of enterprises with obligations training on ICT security;Total;16,07 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;10,99 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;30,55 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.B % of enterprises with obligations training on ICT security;250 or more;67,97 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.C % of enterprises with ICT security obligations by contract;Total;17,33 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;13,02 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;31,31 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.C % of enterprises with ICT security obligations by contract;250 or more;53,54 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.3 % of enterprises with ICT security documentation;Total;27,03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.3 % of enterprises with ICT security documentation;From 10 to 49;19,47 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.3 % of enterprises with ICT security documentation;From 50 to 249;52,9 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.3 % of enterprises with ICT security documentation;250 or more;83,91 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;63,39 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;63,83 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;61,88 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;65,38 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;21,8 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;21,24 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;21,97 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;24,36 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;14,82 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;14,93 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;16,16 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;10,26 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5 % of enterprises with a security incident;Total;14,6 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5 % of enterprises with a security incident;From 10 to 49;11,01 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5 % of enterprises with a security incident;From 50 to 249;25,75 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5 % of enterprises with a security incident;250 or more;46,92 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;73,87 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;69,61 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;80,13 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;81,29 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;22,01 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;24,86 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;13,03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;29,18 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;16,48 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;18,08 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;10,4 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;23,19 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;19,15 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;26,58 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;5,49 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;13,11 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;12,86 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;12,13 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;16,16 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;8,48 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;2 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;0 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;4,04 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;7,8 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;39,53 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;32,57 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;63 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;93,55 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.6.B % of enterprises whose ICT security is handled by external providers;Total;69,57 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;68,84 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;71,39 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;78,05 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.7 % of enterprises that have insurance against ICT security incidents;Total;19,65 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;16,96 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;25,8 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;54,03 1.5. Energy and water (CNAE 35-39);G.1 % of enterprises that apply some ICT security measure;Total;94,33 1.5. Energy and water (CNAE 35-39);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;93,18 1.5. Energy and water (CNAE 35-39);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;96,86 1.5. Energy and water (CNAE 35-39);G.1 % of enterprises that apply some ICT security measure;250 or more;100 1.5. Energy and water (CNAE 35-39);G.1.A % of enterprises with strong password authentication (1);Total;93,77 1.5. Energy and water (CNAE 35-39);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;92,41 1.5. Energy and water (CNAE 35-39);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;96,68 1.5. Energy and water (CNAE 35-39);G.1.A % of enterprises with strong password authentication (1);250 or more;100 1.5. Energy and water (CNAE 35-39);G.1.B % of enterprises with biometric authentication (1);Total;22,71 1.5. Energy and water (CNAE 35-39);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;17,63 1.5. Energy and water (CNAE 35-39);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;29,55 1.5. Energy and water (CNAE 35-39);G.1.B % of enterprises with biometric authentication (1);250 or more;59,2 1.5. Energy and water (CNAE 35-39);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;33,47 1.5. Energy and water (CNAE 35-39);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;28,1 1.5. Energy and water (CNAE 35-39);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;41,57 1.5. Energy and water (CNAE 35-39);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;69,25 1.5. Energy and water (CNAE 35-39);G.1.D % of enterprises with encryption techniques (1);Total;43,04 1.5. Energy and water (CNAE 35-39);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;36,78 1.5. Energy and water (CNAE 35-39);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;52,53 1.5. Energy and water (CNAE 35-39);G.1.D % of enterprises with encryption techniques (1);250 or more;84,51 1.5. Energy and water (CNAE 35-39);G.1.E % of enterprises with data backup in a separate location (1);Total;89,11 1.5. Energy and water (CNAE 35-39);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;87,61 1.5. Energy and water (CNAE 35-39);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;91,44 1.5. Energy and water (CNAE 35-39);G.1.E % of enterprises with data backup in a separate location (1);250 or more;98,95 1.5. Energy and water (CNAE 35-39);G.1.F % of enterprises with control of network access (1);Total;77,61 1.5. Energy and water (CNAE 35-39);G.1.F % of enterprises with control of network access (1);From 10 to 49;74,1 1.5. Energy and water (CNAE 35-39);G.1.F % of enterprises with control of network access (1);From 50 to 249;83,82 1.5. Energy and water (CNAE 35-39);G.1.F % of enterprises with control of network access (1);250 or more;97,89 1.5. Energy and water (CNAE 35-39);G.1.G % of enterprises with a Virtual Private Network (1);Total;59,46 1.5. Energy and water (CNAE 35-39);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;50,6 1.5. Energy and water (CNAE 35-39);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;79,32 1.5. Energy and water (CNAE 35-39);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;96,84 1.5. Energy and water (CNAE 35-39);G.1.H % of enterprises with an ICT security monitoring system;Total;44,44 1.5. Energy and water (CNAE 35-39);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;36,31 1.5. Energy and water (CNAE 35-39);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;58,49 1.5. Energy and water (CNAE 35-39);G.1.H % of enterprises with an ICT security monitoring system;250 or more;92,53 1.5. Energy and water (CNAE 35-39);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;45,66 1.5. Energy and water (CNAE 35-39);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;37,59 1.5. Energy and water (CNAE 35-39);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;59,79 1.5. Energy and water (CNAE 35-39);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;92,86 1.5. Energy and water (CNAE 35-39);G.1.J % of enterprises with an ICT risk assessment (1);Total;37,8 1.5. Energy and water (CNAE 35-39);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;30,48 1.5. Energy and water (CNAE 35-39);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;51,11 1.5. Energy and water (CNAE 35-39);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;78,93 1.5. Energy and water (CNAE 35-39);G.1.K % of enterprises with an ICT security test (1);Total;42,72 1.5. Energy and water (CNAE 35-39);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;35,32 1.5. Energy and water (CNAE 35-39);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;56,52 1.5. Energy and water (CNAE 35-39);G.1.K % of enterprises with an ICT security test (1);250 or more;83,24 1.5. Energy and water (CNAE 35-39);G.2.A % of enterprises with voluntary ICT security training;Total;49,05 1.5. Energy and water (CNAE 35-39);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;43,77 1.5. Energy and water (CNAE 35-39);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;57,5 1.5. Energy and water (CNAE 35-39);G.2.A % of enterprises with voluntary ICT security training;250 or more;86,08 1.5. Energy and water (CNAE 35-39);G.2.B % of enterprises with obligations training on ICT security;Total;24,78 1.5. Energy and water (CNAE 35-39);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;17,95 1.5. Energy and water (CNAE 35-39);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;36,01 1.5. Energy and water (CNAE 35-39);G.2.B % of enterprises with obligations training on ICT security;250 or more;71,8 1.5. Energy and water (CNAE 35-39);G.2.C % of enterprises with ICT security obligations by contract;Total;25,41 1.5. Energy and water (CNAE 35-39);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;22,96 1.5. Energy and water (CNAE 35-39);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;25,12 1.5. Energy and water (CNAE 35-39);G.2.C % of enterprises with ICT security obligations by contract;250 or more;56,92 1.5. Energy and water (CNAE 35-39);G.3 % of enterprises with ICT security documentation;Total;35,69 1.5. Energy and water (CNAE 35-39);G.3 % of enterprises with ICT security documentation;From 10 to 49;28,47 1.5. Energy and water (CNAE 35-39);G.3 % of enterprises with ICT security documentation;From 50 to 249;47,92 1.5. Energy and water (CNAE 35-39);G.3 % of enterprises with ICT security documentation;250 or more;84,2 1.5. Energy and water (CNAE 35-39);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;54,1 1.5. Energy and water (CNAE 35-39);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;46,96 1.5. Energy and water (CNAE 35-39);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;65,22 1.5. Energy and water (CNAE 35-39);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;62,68 1.5. Energy and water (CNAE 35-39);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;32,45 1.5. Energy and water (CNAE 35-39);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;38,02 1.5. Energy and water (CNAE 35-39);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;26,24 1.5. Energy and water (CNAE 35-39);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;20,99 1.5. Energy and water (CNAE 35-39);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;13,45 1.5. Energy and water (CNAE 35-39);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;15,03 1.5. Energy and water (CNAE 35-39);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;8,54 1.5. Energy and water (CNAE 35-39);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;16,33 1.5. Energy and water (CNAE 35-39);G.5 % of enterprises with a security incident;Total;25,91 1.5. Energy and water (CNAE 35-39);G.5 % of enterprises with a security incident;From 10 to 49;26,23 1.5. Energy and water (CNAE 35-39);G.5 % of enterprises with a security incident;From 50 to 249;20,19 1.5. Energy and water (CNAE 35-39);G.5 % of enterprises with a security incident;250 or more;41,44 1.5. Energy and water (CNAE 35-39);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;70,06 1.5. Energy and water (CNAE 35-39);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;68,8 1.5. Energy and water (CNAE 35-39);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;68,79 1.5. Energy and water (CNAE 35-39);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;82,2 1.5. Energy and water (CNAE 35-39);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;22,69 1.5. Energy and water (CNAE 35-39);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;17,68 1.5. Energy and water (CNAE 35-39);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;42,2 1.5. Energy and water (CNAE 35-39);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;29,83 1.5. Energy and water (CNAE 35-39);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;24,67 1.5. Energy and water (CNAE 35-39);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;24,6 1.5. Energy and water (CNAE 35-39);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;21,13 1.5. Energy and water (CNAE 35-39);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;31,14 1.5. Energy and water (CNAE 35-39);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;16,97 1.5. Energy and water (CNAE 35-39);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;14,84 1.5. Energy and water (CNAE 35-39);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;18,58 1.5. Energy and water (CNAE 35-39);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;31,14 1.5. Energy and water (CNAE 35-39);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;2,08 1.5. Energy and water (CNAE 35-39);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;1,82 1.5. Energy and water (CNAE 35-39);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;3,05 1.5. Energy and water (CNAE 35-39);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;2,54 1.5. Energy and water (CNAE 35-39);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;3,19 1.5. Energy and water (CNAE 35-39);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;3,63 1.5. Energy and water (CNAE 35-39);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;0 1.5. Energy and water (CNAE 35-39);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;5,08 1.5. Energy and water (CNAE 35-39);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;52,23 1.5. Energy and water (CNAE 35-39);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;46,69 1.5. Energy and water (CNAE 35-39);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;60,41 1.5. Energy and water (CNAE 35-39);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;93,58 1.5. Energy and water (CNAE 35-39);G.6.B % of enterprises whose ICT security is handled by external providers;Total;70,05 1.5. Energy and water (CNAE 35-39);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;69,01 1.5. Energy and water (CNAE 35-39);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;72,1 1.5. Energy and water (CNAE 35-39);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;76 1.5. Energy and water (CNAE 35-39);G.7 % of enterprises that have insurance against ICT security incidents;Total;20,61 1.5. Energy and water (CNAE 35-39);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;15,36 1.5. Energy and water (CNAE 35-39);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;30,02 1.5. Energy and water (CNAE 35-39);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;54,02 2. Total Construction (CNAE 41-43);G.1 % of enterprises that apply some ICT security measure;Total;85,63 2. Total Construction (CNAE 41-43);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;84,9 2. Total Construction (CNAE 41-43);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;92,26 2. Total Construction (CNAE 41-43);G.1 % of enterprises that apply some ICT security measure;250 or more;95,82 2. Total Construction (CNAE 41-43);G.1.A % of enterprises with strong password authentication (1);Total;86,88 2. Total Construction (CNAE 41-43);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;85,97 2. Total Construction (CNAE 41-43);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;94,44 2. Total Construction (CNAE 41-43);G.1.A % of enterprises with strong password authentication (1);250 or more;96,71 2. Total Construction (CNAE 41-43);G.1.B % of enterprises with biometric authentication (1);Total;12,48 2. Total Construction (CNAE 41-43);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;11,57 2. Total Construction (CNAE 41-43);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;17,26 2. Total Construction (CNAE 41-43);G.1.B % of enterprises with biometric authentication (1);250 or more;55,11 2. Total Construction (CNAE 41-43);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;18,97 2. Total Construction (CNAE 41-43);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;17,82 2. Total Construction (CNAE 41-43);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;25,16 2. Total Construction (CNAE 41-43);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;71,02 2. Total Construction (CNAE 41-43);G.1.D % of enterprises with encryption techniques (1);Total;24,2 2. Total Construction (CNAE 41-43);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;22,19 2. Total Construction (CNAE 41-43);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;38,8 2. Total Construction (CNAE 41-43);G.1.D % of enterprises with encryption techniques (1);250 or more;72,54 2. Total Construction (CNAE 41-43);G.1.E % of enterprises with data backup in a separate location (1);Total;86,62 2. Total Construction (CNAE 41-43);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;85,79 2. Total Construction (CNAE 41-43);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;93,67 2. Total Construction (CNAE 41-43);G.1.E % of enterprises with data backup in a separate location (1);250 or more;94,73 2. Total Construction (CNAE 41-43);G.1.F % of enterprises with control of network access (1);Total;58,33 2. Total Construction (CNAE 41-43);G.1.F % of enterprises with control of network access (1);From 10 to 49;55,72 2. Total Construction (CNAE 41-43);G.1.F % of enterprises with control of network access (1);From 50 to 249;79,62 2. Total Construction (CNAE 41-43);G.1.F % of enterprises with control of network access (1);250 or more;93,62 2. Total Construction (CNAE 41-43);G.1.G % of enterprises with a Virtual Private Network (1);Total;37,09 2. Total Construction (CNAE 41-43);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;34,04 2. Total Construction (CNAE 41-43);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;60,47 2. Total Construction (CNAE 41-43);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;95,28 2. Total Construction (CNAE 41-43);G.1.H % of enterprises with an ICT security monitoring system;Total;22,9 2. Total Construction (CNAE 41-43);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;20,36 2. Total Construction (CNAE 41-43);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;41,88 2. Total Construction (CNAE 41-43);G.1.H % of enterprises with an ICT security monitoring system;250 or more;77,15 2. Total Construction (CNAE 41-43);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;18,04 2. Total Construction (CNAE 41-43);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;15,16 2. Total Construction (CNAE 41-43);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;39,25 2. Total Construction (CNAE 41-43);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;83,21 2. Total Construction (CNAE 41-43);G.1.J % of enterprises with an ICT risk assessment (1);Total;12,49 2. Total Construction (CNAE 41-43);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;10,3 2. Total Construction (CNAE 41-43);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;28,12 2. Total Construction (CNAE 41-43);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;68 2. Total Construction (CNAE 41-43);G.1.K % of enterprises with an ICT security test (1);Total;18,78 2. Total Construction (CNAE 41-43);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;16,7 2. Total Construction (CNAE 41-43);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;33,03 2. Total Construction (CNAE 41-43);G.1.K % of enterprises with an ICT security test (1);250 or more;76,91 2. Total Construction (CNAE 41-43);G.2.A % of enterprises with voluntary ICT security training;Total;29,47 2. Total Construction (CNAE 41-43);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;27,53 2. Total Construction (CNAE 41-43);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;45,28 2. Total Construction (CNAE 41-43);G.2.A % of enterprises with voluntary ICT security training;250 or more;75,7 2. Total Construction (CNAE 41-43);G.2.B % of enterprises with obligations training on ICT security;Total;11,46 2. Total Construction (CNAE 41-43);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;10,01 2. Total Construction (CNAE 41-43);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;22,16 2. Total Construction (CNAE 41-43);G.2.B % of enterprises with obligations training on ICT security;250 or more;59,79 2. Total Construction (CNAE 41-43);G.2.C % of enterprises with ICT security obligations by contract;Total;13,54 2. Total Construction (CNAE 41-43);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;12,2 2. Total Construction (CNAE 41-43);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;24,13 2. Total Construction (CNAE 41-43);G.2.C % of enterprises with ICT security obligations by contract;250 or more;49,32 2. Total Construction (CNAE 41-43);G.3 % of enterprises with ICT security documentation;Total;14,34 2. Total Construction (CNAE 41-43);G.3 % of enterprises with ICT security documentation;From 10 to 49;12,62 2. Total Construction (CNAE 41-43);G.3 % of enterprises with ICT security documentation;From 50 to 249;26,91 2. Total Construction (CNAE 41-43);G.3 % of enterprises with ICT security documentation;250 or more;71,98 2. Total Construction (CNAE 41-43);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;66,89 2. Total Construction (CNAE 41-43);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;67,66 2. Total Construction (CNAE 41-43);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;61,97 2. Total Construction (CNAE 41-43);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;72,43 2. Total Construction (CNAE 41-43);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;21,6 2. Total Construction (CNAE 41-43);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;21,79 2. Total Construction (CNAE 41-43);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;22 2. Total Construction (CNAE 41-43);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;15,78 2. Total Construction (CNAE 41-43);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;11,51 2. Total Construction (CNAE 41-43);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;10,55 2. Total Construction (CNAE 41-43);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;16,03 2. Total Construction (CNAE 41-43);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;11,79 2. Total Construction (CNAE 41-43);G.5 % of enterprises with a security incident;Total;12,69 2. Total Construction (CNAE 41-43);G.5 % of enterprises with a security incident;From 10 to 49;12,03 2. Total Construction (CNAE 41-43);G.5 % of enterprises with a security incident;From 50 to 249;17,07 2. Total Construction (CNAE 41-43);G.5 % of enterprises with a security incident;250 or more;40,29 2. Total Construction (CNAE 41-43);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;62,91 2. Total Construction (CNAE 41-43);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;59,88 2. Total Construction (CNAE 41-43);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;83,21 2. Total Construction (CNAE 41-43);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;70,39 2. Total Construction (CNAE 41-43);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;23,72 2. Total Construction (CNAE 41-43);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;23,33 2. Total Construction (CNAE 41-43);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;24,11 2. Total Construction (CNAE 41-43);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;35,78 2. Total Construction (CNAE 41-43);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;25,34 2. Total Construction (CNAE 41-43);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;26,41 2. Total Construction (CNAE 41-43);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;17,66 2. Total Construction (CNAE 41-43);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;25,48 2. Total Construction (CNAE 41-43);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;21,4 2. Total Construction (CNAE 41-43);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;20,69 2. Total Construction (CNAE 41-43);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;25,74 2. Total Construction (CNAE 41-43);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;25,12 2. Total Construction (CNAE 41-43);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;10,77 2. Total Construction (CNAE 41-43);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;10,42 2. Total Construction (CNAE 41-43);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;12,71 2. Total Construction (CNAE 41-43);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;13,56 2. Total Construction (CNAE 41-43);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;4,12 2. Total Construction (CNAE 41-43);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;3,31 2. Total Construction (CNAE 41-43);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;9,26 2. Total Construction (CNAE 41-43);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;7,49 2. Total Construction (CNAE 41-43);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;29,46 2. Total Construction (CNAE 41-43);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;27,7 2. Total Construction (CNAE 41-43);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;42,96 2. Total Construction (CNAE 41-43);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;81,06 2. Total Construction (CNAE 41-43);G.6.B % of enterprises whose ICT security is handled by external providers;Total;61,92 2. Total Construction (CNAE 41-43);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;60,66 2. Total Construction (CNAE 41-43);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;73,38 2. Total Construction (CNAE 41-43);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;77,82 2. Total Construction (CNAE 41-43);G.7 % of enterprises that have insurance against ICT security incidents;Total;14,04 2. Total Construction (CNAE 41-43);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;12,71 2. Total Construction (CNAE 41-43);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;24,92 2. Total Construction (CNAE 41-43);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;44,69 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1 % of enterprises that apply some ICT security measure;Total;90,94 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;89,95 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;94,82 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1 % of enterprises that apply some ICT security measure;250 or more;98,3 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.A % of enterprises with strong password authentication (1);Total;91,29 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;90,36 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;94,66 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.A % of enterprises with strong password authentication (1);250 or more;97,93 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.B % of enterprises with biometric authentication (1);Total;20,48 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;17,46 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;29,2 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.B % of enterprises with biometric authentication (1);250 or more;51,62 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;29,12 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;24,83 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;43,48 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;64,69 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.D % of enterprises with encryption techniques (1);Total;41,97 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;37,44 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;57,41 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.D % of enterprises with encryption techniques (1);250 or more;78,37 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.E % of enterprises with data backup in a separate location (1);Total;92,62 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;91,6 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;96,79 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.E % of enterprises with data backup in a separate location (1);250 or more;97,9 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.F % of enterprises with control of network access (1);Total;74,66 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.F % of enterprises with control of network access (1);From 10 to 49;71,61 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.F % of enterprises with control of network access (1);From 50 to 249;86,19 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.F % of enterprises with control of network access (1);250 or more;94,24 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.G % of enterprises with a Virtual Private Network (1);Total;56,28 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;50,81 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;76,94 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;91,24 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.H % of enterprises with an ICT security monitoring system;Total;45,66 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;40,65 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;63,51 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.H % of enterprises with an ICT security monitoring system;250 or more;82,67 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;43,55 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;38,1 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;63,18 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;82,62 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.J % of enterprises with an ICT risk assessment (1);Total;34,55 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;29,46 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;51,63 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;76,42 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.K % of enterprises with an ICT security test (1);Total;39,22 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;34,37 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;55,55 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.K % of enterprises with an ICT security test (1);250 or more;79,19 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.A % of enterprises with voluntary ICT security training;Total;47,35 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;43,45 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;61,49 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.A % of enterprises with voluntary ICT security training;250 or more;80,9 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.B % of enterprises with obligations training on ICT security;Total;24,37 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;20,75 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;36,23 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.B % of enterprises with obligations training on ICT security;250 or more;61,23 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.C % of enterprises with ICT security obligations by contract;Total;26,08 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;22,84 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;37,73 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.C % of enterprises with ICT security obligations by contract;250 or more;54,54 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.3 % of enterprises with ICT security documentation;Total;35,63 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.3 % of enterprises with ICT security documentation;From 10 to 49;31,57 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.3 % of enterprises with ICT security documentation;From 50 to 249;49,35 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.3 % of enterprises with ICT security documentation;250 or more;75,3 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;64,45 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;64,16 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;65,12 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;65,45 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;23,82 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;24,57 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;21,68 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;22,32 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;11,73 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;11,27 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;13,19 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;12,23 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5 % of enterprises with a security incident;Total;18,62 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5 % of enterprises with a security incident;From 10 to 49;16,01 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5 % of enterprises with a security incident;From 50 to 249;28,29 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5 % of enterprises with a security incident;250 or more;40,2 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;77,81 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;76,53 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;81,34 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;79,28 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;23,33 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;22,03 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;24 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;34,24 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;21,93 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;22,39 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;20,75 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;21,08 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;17 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;16,88 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;16,32 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;20,35 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;8,02 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;7,23 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;10,15 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;9,09 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;4,01 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;2,64 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;7,1 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;7,87 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;44,09 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;39,51 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;60,72 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;83,52 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.6.B % of enterprises whose ICT security is handled by external providers;Total;67,75 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;66,8 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;70,85 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;77,56 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.7 % of enterprises that have insurance against ICT security incidents;Total;25,34 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;22,3 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;35,9 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;53,6 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1 % of enterprises that apply some ICT security measure;Total;91,46 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;90,42 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;96,6 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1 % of enterprises that apply some ICT security measure;250 or more;97,71 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.A % of enterprises with strong password authentication (1);Total;90,71 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;90,03 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;93,57 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.A % of enterprises with strong password authentication (1);250 or more;96,36 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.B % of enterprises with biometric authentication (1);Total;18,22 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;14,7 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;31,91 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.B % of enterprises with biometric authentication (1);250 or more;53,21 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;23,76 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;19,82 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;39,57 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;59,59 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.D % of enterprises with encryption techniques (1);Total;35,49 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;30,43 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;56,56 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.D % of enterprises with encryption techniques (1);250 or more;77,45 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.E % of enterprises with data backup in a separate location (1);Total;93,21 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;92,35 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;97,22 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.E % of enterprises with data backup in a separate location (1);250 or more;97,79 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.F % of enterprises with control of network access (1);Total;74,11 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.F % of enterprises with control of network access (1);From 10 to 49;70,92 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.F % of enterprises with control of network access (1);From 50 to 249;88,1 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.F % of enterprises with control of network access (1);250 or more;96,13 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.G % of enterprises with a Virtual Private Network (1);Total;54,14 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;48,13 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;81,11 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;92,14 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.H % of enterprises with an ICT security monitoring system;Total;40,68 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;35,56 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;62,13 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.H % of enterprises with an ICT security monitoring system;250 or more;82,06 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;39,08 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;33,35 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;63,62 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;82,46 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.J % of enterprises with an ICT risk assessment (1);Total;28,46 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;23,55 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;47,9 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;74,88 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.K % of enterprises with an ICT security test (1);Total;33,36 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;28,5 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;52,96 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.K % of enterprises with an ICT security test (1);250 or more;77,18 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.A % of enterprises with voluntary ICT security training;Total;40,51 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;36,43 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;58,25 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.A % of enterprises with voluntary ICT security training;250 or more;79,41 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.B % of enterprises with obligations training on ICT security;Total;19,71 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;16,54 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;32,61 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.B % of enterprises with obligations training on ICT security;250 or more;55,37 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.C % of enterprises with ICT security obligations by contract;Total;21,16 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;17,73 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;36,52 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.C % of enterprises with ICT security obligations by contract;250 or more;51,2 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.3 % of enterprises with ICT security documentation;Total;28,91 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.3 % of enterprises with ICT security documentation;From 10 to 49;25,01 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.3 % of enterprises with ICT security documentation;From 50 to 249;45,16 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.3 % of enterprises with ICT security documentation;250 or more;70,37 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;61,13 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;60,24 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;63,72 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;62,48 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;26,81 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;28,21 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;23,13 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;23,34 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;12,05 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;11,55 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;13,14 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;14,18 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5 % of enterprises with a security incident;Total;17,19 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5 % of enterprises with a security incident;From 10 to 49;13,97 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5 % of enterprises with a security incident;From 50 to 249;32,68 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5 % of enterprises with a security incident;250 or more;38,79 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;75,62 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;73,62 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;79,22 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;83,02 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;21,92 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;20,39 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;24,36 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;29,21 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;20,09 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;19,9 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;20,81 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;18,97 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;19,87 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;19,88 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;19,64 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;20,86 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;7,51 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;6,19 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;10,33 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;10,13 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;3,75 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;0,81 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;10,6 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;6,77 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;40,07 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;35,11 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;61,7 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;87,17 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.6.B % of enterprises whose ICT security is handled by external providers;Total;73,62 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;72,95 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;77,12 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;76,45 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.7 % of enterprises that have insurance against ICT security incidents;Total;21,91 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;19,05 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;35,05 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;44,94 3.2. Transport and storage (CNAE 49-53);G.1 % of enterprises that apply some ICT security measure;Total;88,8 3.2. Transport and storage (CNAE 49-53);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;87,64 3.2. Transport and storage (CNAE 49-53);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;93,38 3.2. Transport and storage (CNAE 49-53);G.1 % of enterprises that apply some ICT security measure;250 or more;98,41 3.2. Transport and storage (CNAE 49-53);G.1.A % of enterprises with strong password authentication (1);Total;89,28 3.2. Transport and storage (CNAE 49-53);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;87,67 3.2. Transport and storage (CNAE 49-53);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;95,76 3.2. Transport and storage (CNAE 49-53);G.1.A % of enterprises with strong password authentication (1);250 or more;99,27 3.2. Transport and storage (CNAE 49-53);G.1.B % of enterprises with biometric authentication (1);Total;17,43 3.2. Transport and storage (CNAE 49-53);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;15,61 3.2. Transport and storage (CNAE 49-53);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;18,65 3.2. Transport and storage (CNAE 49-53);G.1.B % of enterprises with biometric authentication (1);250 or more;52,42 3.2. Transport and storage (CNAE 49-53);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;23,52 3.2. Transport and storage (CNAE 49-53);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;19,93 3.2. Transport and storage (CNAE 49-53);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;32,54 3.2. Transport and storage (CNAE 49-53);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;67,07 3.2. Transport and storage (CNAE 49-53);G.1.D % of enterprises with encryption techniques (1);Total;30,32 3.2. Transport and storage (CNAE 49-53);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;26,56 3.2. Transport and storage (CNAE 49-53);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;39,11 3.2. Transport and storage (CNAE 49-53);G.1.D % of enterprises with encryption techniques (1);250 or more;78,64 3.2. Transport and storage (CNAE 49-53);G.1.E % of enterprises with data backup in a separate location (1);Total;88,5 3.2. Transport and storage (CNAE 49-53);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;87,17 3.2. Transport and storage (CNAE 49-53);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;93,74 3.2. Transport and storage (CNAE 49-53);G.1.E % of enterprises with data backup in a separate location (1);250 or more;97,31 3.2. Transport and storage (CNAE 49-53);G.1.F % of enterprises with control of network access (1);Total;62,62 3.2. Transport and storage (CNAE 49-53);G.1.F % of enterprises with control of network access (1);From 10 to 49;57,86 3.2. Transport and storage (CNAE 49-53);G.1.F % of enterprises with control of network access (1);From 50 to 249;81,09 3.2. Transport and storage (CNAE 49-53);G.1.F % of enterprises with control of network access (1);250 or more;94,91 3.2. Transport and storage (CNAE 49-53);G.1.G % of enterprises with a Virtual Private Network (1);Total;47,8 3.2. Transport and storage (CNAE 49-53);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;42,35 3.2. Transport and storage (CNAE 49-53);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;66,99 3.2. Transport and storage (CNAE 49-53);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;92,56 3.2. Transport and storage (CNAE 49-53);G.1.H % of enterprises with an ICT security monitoring system;Total;36,92 3.2. Transport and storage (CNAE 49-53);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;31,59 3.2. Transport and storage (CNAE 49-53);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;54,64 3.2. Transport and storage (CNAE 49-53);G.1.H % of enterprises with an ICT security monitoring system;250 or more;84,85 3.2. Transport and storage (CNAE 49-53);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;31,18 3.2. Transport and storage (CNAE 49-53);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;24,87 3.2. Transport and storage (CNAE 49-53);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;52,47 3.2. Transport and storage (CNAE 49-53);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;86,52 3.2. Transport and storage (CNAE 49-53);G.1.J % of enterprises with an ICT risk assessment (1);Total;24,62 3.2. Transport and storage (CNAE 49-53);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;20,23 3.2. Transport and storage (CNAE 49-53);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;36,52 3.2. Transport and storage (CNAE 49-53);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;74,58 3.2. Transport and storage (CNAE 49-53);G.1.K % of enterprises with an ICT security test (1);Total;31,4 3.2. Transport and storage (CNAE 49-53);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;25,45 3.2. Transport and storage (CNAE 49-53);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;51,87 3.2. Transport and storage (CNAE 49-53);G.1.K % of enterprises with an ICT security test (1);250 or more;82,06 3.2. Transport and storage (CNAE 49-53);G.2.A % of enterprises with voluntary ICT security training;Total;40,4 3.2. Transport and storage (CNAE 49-53);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;36,57 3.2. Transport and storage (CNAE 49-53);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;53,62 3.2. Transport and storage (CNAE 49-53);G.2.A % of enterprises with voluntary ICT security training;250 or more;80,26 3.2. Transport and storage (CNAE 49-53);G.2.B % of enterprises with obligations training on ICT security;Total;17,95 3.2. Transport and storage (CNAE 49-53);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;15,23 3.2. Transport and storage (CNAE 49-53);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;23,95 3.2. Transport and storage (CNAE 49-53);G.2.B % of enterprises with obligations training on ICT security;250 or more;60,1 3.2. Transport and storage (CNAE 49-53);G.2.C % of enterprises with ICT security obligations by contract;Total;20,97 3.2. Transport and storage (CNAE 49-53);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;18,07 3.2. Transport and storage (CNAE 49-53);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;30,19 3.2. Transport and storage (CNAE 49-53);G.2.C % of enterprises with ICT security obligations by contract;250 or more;54,7 3.2. Transport and storage (CNAE 49-53);G.3 % of enterprises with ICT security documentation;Total;26,7 3.2. Transport and storage (CNAE 49-53);G.3 % of enterprises with ICT security documentation;From 10 to 49;22,6 3.2. Transport and storage (CNAE 49-53);G.3 % of enterprises with ICT security documentation;From 50 to 249;39,26 3.2. Transport and storage (CNAE 49-53);G.3 % of enterprises with ICT security documentation;250 or more;76,04 3.2. Transport and storage (CNAE 49-53);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;61,99 3.2. Transport and storage (CNAE 49-53);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;64,89 3.2. Transport and storage (CNAE 49-53);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;55,12 3.2. Transport and storage (CNAE 49-53);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;55,42 3.2. Transport and storage (CNAE 49-53);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;27 3.2. Transport and storage (CNAE 49-53);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;26,88 3.2. Transport and storage (CNAE 49-53);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;28,17 3.2. Transport and storage (CNAE 49-53);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;25,42 3.2. Transport and storage (CNAE 49-53);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;11 3.2. Transport and storage (CNAE 49-53);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;8,24 3.2. Transport and storage (CNAE 49-53);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;16,71 3.2. Transport and storage (CNAE 49-53);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;19,16 3.2. Transport and storage (CNAE 49-53);G.5 % of enterprises with a security incident;Total;14,01 3.2. Transport and storage (CNAE 49-53);G.5 % of enterprises with a security incident;From 10 to 49;11,55 3.2. Transport and storage (CNAE 49-53);G.5 % of enterprises with a security incident;From 50 to 249;20,81 3.2. Transport and storage (CNAE 49-53);G.5 % of enterprises with a security incident;250 or more;46,54 3.2. Transport and storage (CNAE 49-53);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;73,18 3.2. Transport and storage (CNAE 49-53);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;72,54 3.2. Transport and storage (CNAE 49-53);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;75,28 3.2. Transport and storage (CNAE 49-53);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;73,26 3.2. Transport and storage (CNAE 49-53);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;24,27 3.2. Transport and storage (CNAE 49-53);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;22,5 3.2. Transport and storage (CNAE 49-53);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;20,92 3.2. Transport and storage (CNAE 49-53);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;41,24 3.2. Transport and storage (CNAE 49-53);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;32,6 3.2. Transport and storage (CNAE 49-53);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;40,57 3.2. Transport and storage (CNAE 49-53);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;9,7 3.2. Transport and storage (CNAE 49-53);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;26,01 3.2. Transport and storage (CNAE 49-53);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;13,44 3.2. Transport and storage (CNAE 49-53);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;12,45 3.2. Transport and storage (CNAE 49-53);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;11,43 3.2. Transport and storage (CNAE 49-53);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;23,14 3.2. Transport and storage (CNAE 49-53);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;8,79 3.2. Transport and storage (CNAE 49-53);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;7,48 3.2. Transport and storage (CNAE 49-53);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;14,57 3.2. Transport and storage (CNAE 49-53);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;6,21 3.2. Transport and storage (CNAE 49-53);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;0,73 3.2. Transport and storage (CNAE 49-53);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;0 3.2. Transport and storage (CNAE 49-53);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;1,89 3.2. Transport and storage (CNAE 49-53);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;3,08 3.2. Transport and storage (CNAE 49-53);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;33,94 3.2. Transport and storage (CNAE 49-53);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;29,4 3.2. Transport and storage (CNAE 49-53);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;47,65 3.2. Transport and storage (CNAE 49-53);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;89,51 3.2. Transport and storage (CNAE 49-53);G.6.B % of enterprises whose ICT security is handled by external providers;Total;68,04 3.2. Transport and storage (CNAE 49-53);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;66,12 3.2. Transport and storage (CNAE 49-53);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;75,96 3.2. Transport and storage (CNAE 49-53);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;82,88 3.2. Transport and storage (CNAE 49-53);G.7 % of enterprises that have insurance against ICT security incidents;Total;18,93 3.2. Transport and storage (CNAE 49-53);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;16,15 3.2. Transport and storage (CNAE 49-53);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;27,37 3.2. Transport and storage (CNAE 49-53);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;52,63 3.3. Accommodation services (CNAE 55);G.1 % of enterprises that apply some ICT security measure;Total;96,15 3.3. Accommodation services (CNAE 55);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;95,13 3.3. Accommodation services (CNAE 55);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;100 3.3. Accommodation services (CNAE 55);G.1 % of enterprises that apply some ICT security measure;250 or more;100 3.3. Accommodation services (CNAE 55);G.1.A % of enterprises with strong password authentication (1);Total;94,16 3.3. Accommodation services (CNAE 55);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;93 3.3. Accommodation services (CNAE 55);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;98,35 3.3. Accommodation services (CNAE 55);G.1.A % of enterprises with strong password authentication (1);250 or more;97,94 3.3. Accommodation services (CNAE 55);G.1.B % of enterprises with biometric authentication (1);Total;24,03 3.3. Accommodation services (CNAE 55);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;18,75 3.3. Accommodation services (CNAE 55);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;37,01 3.3. Accommodation services (CNAE 55);G.1.B % of enterprises with biometric authentication (1);250 or more;69,52 3.3. Accommodation services (CNAE 55);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;22,55 3.3. Accommodation services (CNAE 55);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;16,53 3.3. Accommodation services (CNAE 55);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;38,23 3.3. Accommodation services (CNAE 55);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;70,29 3.3. Accommodation services (CNAE 55);G.1.D % of enterprises with encryption techniques (1);Total;39,25 3.3. Accommodation services (CNAE 55);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;32,86 3.3. Accommodation services (CNAE 55);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;58,58 3.3. Accommodation services (CNAE 55);G.1.D % of enterprises with encryption techniques (1);250 or more;77,45 3.3. Accommodation services (CNAE 55);G.1.E % of enterprises with data backup in a separate location (1);Total;91,59 3.3. Accommodation services (CNAE 55);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;89,57 3.3. Accommodation services (CNAE 55);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;98,52 3.3. Accommodation services (CNAE 55);G.1.E % of enterprises with data backup in a separate location (1);250 or more;100 3.3. Accommodation services (CNAE 55);G.1.F % of enterprises with control of network access (1);Total;74,88 3.3. Accommodation services (CNAE 55);G.1.F % of enterprises with control of network access (1);From 10 to 49;70,32 3.3. Accommodation services (CNAE 55);G.1.F % of enterprises with control of network access (1);From 50 to 249;89,82 3.3. Accommodation services (CNAE 55);G.1.F % of enterprises with control of network access (1);250 or more;96,99 3.3. Accommodation services (CNAE 55);G.1.G % of enterprises with a Virtual Private Network (1);Total;48,03 3.3. Accommodation services (CNAE 55);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;37,21 3.3. Accommodation services (CNAE 55);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;84 3.3. Accommodation services (CNAE 55);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;98,07 3.3. Accommodation services (CNAE 55);G.1.H % of enterprises with an ICT security monitoring system;Total;42,08 3.3. Accommodation services (CNAE 55);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;33,5 3.3. Accommodation services (CNAE 55);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;68,07 3.3. Accommodation services (CNAE 55);G.1.H % of enterprises with an ICT security monitoring system;250 or more;93,28 3.3. Accommodation services (CNAE 55);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;40,8 3.3. Accommodation services (CNAE 55);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;32,33 3.3. Accommodation services (CNAE 55);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;66,25 3.3. Accommodation services (CNAE 55);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;92,38 3.3. Accommodation services (CNAE 55);G.1.J % of enterprises with an ICT risk assessment (1);Total;30,97 3.3. Accommodation services (CNAE 55);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;24,46 3.3. Accommodation services (CNAE 55);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;47,99 3.3. Accommodation services (CNAE 55);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;82,41 3.3. Accommodation services (CNAE 55);G.1.K % of enterprises with an ICT security test (1);Total;31,82 3.3. Accommodation services (CNAE 55);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;22,81 3.3. Accommodation services (CNAE 55);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;59,43 3.3. Accommodation services (CNAE 55);G.1.K % of enterprises with an ICT security test (1);250 or more;84,38 3.3. Accommodation services (CNAE 55);G.2.A % of enterprises with voluntary ICT security training;Total;50,09 3.3. Accommodation services (CNAE 55);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;46,02 3.3. Accommodation services (CNAE 55);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;61,4 3.3. Accommodation services (CNAE 55);G.2.A % of enterprises with voluntary ICT security training;250 or more;83,28 3.3. Accommodation services (CNAE 55);G.2.B % of enterprises with obligations training on ICT security;Total;20,99 3.3. Accommodation services (CNAE 55);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;16,19 3.3. Accommodation services (CNAE 55);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;32,78 3.3. Accommodation services (CNAE 55);G.2.B % of enterprises with obligations training on ICT security;250 or more;67,1 3.3. Accommodation services (CNAE 55);G.2.C % of enterprises with ICT security obligations by contract;Total;27,41 3.3. Accommodation services (CNAE 55);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;21,86 3.3. Accommodation services (CNAE 55);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;43,38 3.3. Accommodation services (CNAE 55);G.2.C % of enterprises with ICT security obligations by contract;250 or more;70,12 3.3. Accommodation services (CNAE 55);G.3 % of enterprises with ICT security documentation;Total;27,77 3.3. Accommodation services (CNAE 55);G.3 % of enterprises with ICT security documentation;From 10 to 49;22,06 3.3. Accommodation services (CNAE 55);G.3 % of enterprises with ICT security documentation;From 50 to 249;42,76 3.3. Accommodation services (CNAE 55);G.3 % of enterprises with ICT security documentation;250 or more;78,32 3.3. Accommodation services (CNAE 55);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;48,05 3.3. Accommodation services (CNAE 55);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;48,1 3.3. Accommodation services (CNAE 55);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;52,58 3.3. Accommodation services (CNAE 55);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;36,43 3.3. Accommodation services (CNAE 55);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;35,91 3.3. Accommodation services (CNAE 55);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;36,88 3.3. Accommodation services (CNAE 55);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;29,76 3.3. Accommodation services (CNAE 55);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;45,61 3.3. Accommodation services (CNAE 55);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;16,04 3.3. Accommodation services (CNAE 55);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;15,02 3.3. Accommodation services (CNAE 55);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;17,66 3.3. Accommodation services (CNAE 55);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;17,96 3.3. Accommodation services (CNAE 55);G.5 % of enterprises with a security incident;Total;20,84 3.3. Accommodation services (CNAE 55);G.5 % of enterprises with a security incident;From 10 to 49;16,9 3.3. Accommodation services (CNAE 55);G.5 % of enterprises with a security incident;From 50 to 249;32,56 3.3. Accommodation services (CNAE 55);G.5 % of enterprises with a security incident;250 or more;49,3 3.3. Accommodation services (CNAE 55);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;84,89 3.3. Accommodation services (CNAE 55);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;84,68 3.3. Accommodation services (CNAE 55);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;86,54 3.3. Accommodation services (CNAE 55);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;81,45 3.3. Accommodation services (CNAE 55);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;24,03 3.3. Accommodation services (CNAE 55);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;22,65 3.3. Accommodation services (CNAE 55);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;26,51 3.3. Accommodation services (CNAE 55);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;26,48 3.3. Accommodation services (CNAE 55);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;30,32 3.3. Accommodation services (CNAE 55);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;28,77 3.3. Accommodation services (CNAE 55);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;36,95 3.3. Accommodation services (CNAE 55);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;21,36 3.3. Accommodation services (CNAE 55);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;15,3 3.3. Accommodation services (CNAE 55);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;14,45 3.3. Accommodation services (CNAE 55);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;16,17 3.3. Accommodation services (CNAE 55);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;18,81 3.3. Accommodation services (CNAE 55);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;3,55 3.3. Accommodation services (CNAE 55);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;2,93 3.3. Accommodation services (CNAE 55);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;2,04 3.3. Accommodation services (CNAE 55);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;12,56 3.3. Accommodation services (CNAE 55);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;3,77 3.3. Accommodation services (CNAE 55);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;2,93 3.3. Accommodation services (CNAE 55);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;4,08 3.3. Accommodation services (CNAE 55);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;8,85 3.3. Accommodation services (CNAE 55);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;33,8 3.3. Accommodation services (CNAE 55);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;26,57 3.3. Accommodation services (CNAE 55);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;53,67 3.3. Accommodation services (CNAE 55);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;93,86 3.3. Accommodation services (CNAE 55);G.6.B % of enterprises whose ICT security is handled by external providers;Total;77,64 3.3. Accommodation services (CNAE 55);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;75,51 3.3. Accommodation services (CNAE 55);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;84,76 3.3. Accommodation services (CNAE 55);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;89,54 3.3. Accommodation services (CNAE 55);G.7 % of enterprises that have insurance against ICT security incidents;Total;25,52 3.3. Accommodation services (CNAE 55);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;21,31 3.3. Accommodation services (CNAE 55);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;35,11 3.3. Accommodation services (CNAE 55);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;69,48 3.4. Information and communications (CNAE 58-63);G.1 % of enterprises that apply some ICT security measure;Total;95,94 3.4. Information and communications (CNAE 58-63);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;94,94 3.4. Information and communications (CNAE 58-63);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;99,02 3.4. Information and communications (CNAE 58-63);G.1 % of enterprises that apply some ICT security measure;250 or more;100 3.4. Information and communications (CNAE 58-63);G.1.A % of enterprises with strong password authentication (1);Total;97,47 3.4. Information and communications (CNAE 58-63);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;97,24 3.4. Information and communications (CNAE 58-63);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;97,85 3.4. Information and communications (CNAE 58-63);G.1.A % of enterprises with strong password authentication (1);250 or more;99,59 3.4. Information and communications (CNAE 58-63);G.1.B % of enterprises with biometric authentication (1);Total;34,63 3.4. Information and communications (CNAE 58-63);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;31,64 3.4. Information and communications (CNAE 58-63);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;39,11 3.4. Information and communications (CNAE 58-63);G.1.B % of enterprises with biometric authentication (1);250 or more;63,6 3.4. Information and communications (CNAE 58-63);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;54,54 3.4. Information and communications (CNAE 58-63);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;48,78 3.4. Information and communications (CNAE 58-63);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;69,28 3.4. Information and communications (CNAE 58-63);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;85,57 3.4. Information and communications (CNAE 58-63);G.1.D % of enterprises with encryption techniques (1);Total;71,68 3.4. Information and communications (CNAE 58-63);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;66,93 3.4. Information and communications (CNAE 58-63);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;84,49 3.4. Information and communications (CNAE 58-63);G.1.D % of enterprises with encryption techniques (1);250 or more;94,6 3.4. Information and communications (CNAE 58-63);G.1.E % of enterprises with data backup in a separate location (1);Total;96,47 3.4. Information and communications (CNAE 58-63);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;96,22 3.4. Information and communications (CNAE 58-63);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;96,77 3.4. Information and communications (CNAE 58-63);G.1.E % of enterprises with data backup in a separate location (1);250 or more;99,18 3.4. Information and communications (CNAE 58-63);G.1.F % of enterprises with control of network access (1);Total;87,16 3.4. Information and communications (CNAE 58-63);G.1.F % of enterprises with control of network access (1);From 10 to 49;85,02 3.4. Information and communications (CNAE 58-63);G.1.F % of enterprises with control of network access (1);From 50 to 249;92,88 3.4. Information and communications (CNAE 58-63);G.1.F % of enterprises with control of network access (1);250 or more;97,74 3.4. Information and communications (CNAE 58-63);G.1.G % of enterprises with a Virtual Private Network (1);Total;76,69 3.4. Information and communications (CNAE 58-63);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;70,88 3.4. Information and communications (CNAE 58-63);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;94,17 3.4. Information and communications (CNAE 58-63);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;97,69 3.4. Information and communications (CNAE 58-63);G.1.H % of enterprises with an ICT security monitoring system;Total;70,95 3.4. Information and communications (CNAE 58-63);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;67,57 3.4. Information and communications (CNAE 58-63);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;78,08 3.4. Information and communications (CNAE 58-63);G.1.H % of enterprises with an ICT security monitoring system;250 or more;95,4 3.4. Information and communications (CNAE 58-63);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;74,64 3.4. Information and communications (CNAE 58-63);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;70,46 3.4. Information and communications (CNAE 58-63);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;85,81 3.4. Information and communications (CNAE 58-63);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;95,18 3.4. Information and communications (CNAE 58-63);G.1.J % of enterprises with an ICT risk assessment (1);Total;63,15 3.4. Information and communications (CNAE 58-63);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;58,07 3.4. Information and communications (CNAE 58-63);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;75,52 3.4. Information and communications (CNAE 58-63);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;93,25 3.4. Information and communications (CNAE 58-63);G.1.K % of enterprises with an ICT security test (1);Total;66,64 3.4. Information and communications (CNAE 58-63);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;62,6 3.4. Information and communications (CNAE 58-63);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;75,62 3.4. Information and communications (CNAE 58-63);G.1.K % of enterprises with an ICT security test (1);250 or more;93,91 3.4. Information and communications (CNAE 58-63);G.2.A % of enterprises with voluntary ICT security training;Total;78,68 3.4. Information and communications (CNAE 58-63);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;76,38 3.4. Information and communications (CNAE 58-63);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;84,17 3.4. Information and communications (CNAE 58-63);G.2.A % of enterprises with voluntary ICT security training;250 or more;94,39 3.4. Information and communications (CNAE 58-63);G.2.B % of enterprises with obligations training on ICT security;Total;48,64 3.4. Information and communications (CNAE 58-63);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;42,24 3.4. Information and communications (CNAE 58-63);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;65,39 3.4. Information and communications (CNAE 58-63);G.2.B % of enterprises with obligations training on ICT security;250 or more;86,4 3.4. Information and communications (CNAE 58-63);G.2.C % of enterprises with ICT security obligations by contract;Total;48,84 3.4. Information and communications (CNAE 58-63);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;44,83 3.4. Information and communications (CNAE 58-63);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;59,03 3.4. Information and communications (CNAE 58-63);G.2.C % of enterprises with ICT security obligations by contract;250 or more;73,65 3.4. Information and communications (CNAE 58-63);G.3 % of enterprises with ICT security documentation;Total;66,29 3.4. Information and communications (CNAE 58-63);G.3 % of enterprises with ICT security documentation;From 10 to 49;61,66 3.4. Information and communications (CNAE 58-63);G.3 % of enterprises with ICT security documentation;From 50 to 249;79,1 3.4. Information and communications (CNAE 58-63);G.3 % of enterprises with ICT security documentation;250 or more;90,77 3.4. Information and communications (CNAE 58-63);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;74,55 3.4. Information and communications (CNAE 58-63);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;73,61 3.4. Information and communications (CNAE 58-63);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;77,78 3.4. Information and communications (CNAE 58-63);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;73,69 3.4. Information and communications (CNAE 58-63);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;17,99 3.4. Information and communications (CNAE 58-63);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;19,04 3.4. Information and communications (CNAE 58-63);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;14,52 3.4. Information and communications (CNAE 58-63);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;18,44 3.4. Information and communications (CNAE 58-63);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;7,46 3.4. Information and communications (CNAE 58-63);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;7,35 3.4. Information and communications (CNAE 58-63);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;7,7 3.4. Information and communications (CNAE 58-63);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;7,87 3.4. Information and communications (CNAE 58-63);G.5 % of enterprises with a security incident;Total;24,03 3.4. Information and communications (CNAE 58-63);G.5 % of enterprises with a security incident;From 10 to 49;21,04 3.4. Information and communications (CNAE 58-63);G.5 % of enterprises with a security incident;From 50 to 249;30,85 3.4. Information and communications (CNAE 58-63);G.5 % of enterprises with a security incident;250 or more;45,67 3.4. Information and communications (CNAE 58-63);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;81,6 3.4. Information and communications (CNAE 58-63);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;81,5 3.4. Information and communications (CNAE 58-63);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;82,86 3.4. Information and communications (CNAE 58-63);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;78,9 3.4. Information and communications (CNAE 58-63);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;21,75 3.4. Information and communications (CNAE 58-63);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;18,88 3.4. Information and communications (CNAE 58-63);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;23,24 3.4. Information and communications (CNAE 58-63);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;39,53 3.4. Information and communications (CNAE 58-63);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;24,44 3.4. Information and communications (CNAE 58-63);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;25,76 3.4. Information and communications (CNAE 58-63);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;19,22 3.4. Information and communications (CNAE 58-63);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;28,73 3.4. Information and communications (CNAE 58-63);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;12,06 3.4. Information and communications (CNAE 58-63);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;10,23 3.4. Information and communications (CNAE 58-63);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;11,34 3.4. Information and communications (CNAE 58-63);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;27,99 3.4. Information and communications (CNAE 58-63);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;6,31 3.4. Information and communications (CNAE 58-63);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;4,96 3.4. Information and communications (CNAE 58-63);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;9,53 3.4. Information and communications (CNAE 58-63);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;7,73 3.4. Information and communications (CNAE 58-63);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;6,97 3.4. Information and communications (CNAE 58-63);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;7,14 3.4. Information and communications (CNAE 58-63);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;5 3.4. Information and communications (CNAE 58-63);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;11,07 3.4. Information and communications (CNAE 58-63);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;79,59 3.4. Information and communications (CNAE 58-63);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;76,21 3.4. Information and communications (CNAE 58-63);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;89,34 3.4. Information and communications (CNAE 58-63);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;95,96 3.4. Information and communications (CNAE 58-63);G.6.B % of enterprises whose ICT security is handled by external providers;Total;42,52 3.4. Information and communications (CNAE 58-63);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;40,74 3.4. Information and communications (CNAE 58-63);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;43,28 3.4. Information and communications (CNAE 58-63);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;68,83 3.4. Information and communications (CNAE 58-63);G.7 % of enterprises that have insurance against ICT security incidents;Total;45 3.4. Information and communications (CNAE 58-63);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;40,55 3.4. Information and communications (CNAE 58-63);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;54,93 3.4. Information and communications (CNAE 58-63);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;78,06 3.5. Real estate activities (CNAE 68);G.1 % of enterprises that apply some ICT security measure;Total;98,09 3.5. Real estate activities (CNAE 68);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;98,35 3.5. Real estate activities (CNAE 68);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;92,77 3.5. Real estate activities (CNAE 68);G.1 % of enterprises that apply some ICT security measure;250 or more;100 3.5. Real estate activities (CNAE 68);G.1.A % of enterprises with strong password authentication (1);Total;93,47 3.5. Real estate activities (CNAE 68);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;93,05 3.5. Real estate activities (CNAE 68);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;100 3.5. Real estate activities (CNAE 68);G.1.A % of enterprises with strong password authentication (1);250 or more;100 3.5. Real estate activities (CNAE 68);G.1.B % of enterprises with biometric authentication (1);Total;13,79 3.5. Real estate activities (CNAE 68);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;12,89 3.5. Real estate activities (CNAE 68);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;26,71 3.5. Real estate activities (CNAE 68);G.1.B % of enterprises with biometric authentication (1);250 or more;31,67 3.5. Real estate activities (CNAE 68);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;28,95 3.5. Real estate activities (CNAE 68);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;26,51 3.5. Real estate activities (CNAE 68);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;62,74 3.5. Real estate activities (CNAE 68);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;82,2 3.5. Real estate activities (CNAE 68);G.1.D % of enterprises with encryption techniques (1);Total;54,35 3.5. Real estate activities (CNAE 68);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;53,35 3.5. Real estate activities (CNAE 68);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;63,25 3.5. Real estate activities (CNAE 68);G.1.D % of enterprises with encryption techniques (1);250 or more;94,44 3.5. Real estate activities (CNAE 68);G.1.E % of enterprises with data backup in a separate location (1);Total;95,79 3.5. Real estate activities (CNAE 68);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;95,59 3.5. Real estate activities (CNAE 68);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;100 3.5. Real estate activities (CNAE 68);G.1.E % of enterprises with data backup in a separate location (1);250 or more;94,44 3.5. Real estate activities (CNAE 68);G.1.F % of enterprises with control of network access (1);Total;83,37 3.5. Real estate activities (CNAE 68);G.1.F % of enterprises with control of network access (1);From 10 to 49;82,45 3.5. Real estate activities (CNAE 68);G.1.F % of enterprises with control of network access (1);From 50 to 249;100 3.5. Real estate activities (CNAE 68);G.1.F % of enterprises with control of network access (1);250 or more;88,89 3.5. Real estate activities (CNAE 68);G.1.G % of enterprises with a Virtual Private Network (1);Total;51,11 3.5. Real estate activities (CNAE 68);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;48,39 3.5. Real estate activities (CNAE 68);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;94,43 3.5. Real estate activities (CNAE 68);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;88,89 3.5. Real estate activities (CNAE 68);G.1.H % of enterprises with an ICT security monitoring system;Total;60,32 3.5. Real estate activities (CNAE 68);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;58,55 3.5. Real estate activities (CNAE 68);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;87,51 3.5. Real estate activities (CNAE 68);G.1.H % of enterprises with an ICT security monitoring system;250 or more;88,89 3.5. Real estate activities (CNAE 68);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;39,68 3.5. Real estate activities (CNAE 68);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;36,16 3.5. Real estate activities (CNAE 68);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;94,23 3.5. Real estate activities (CNAE 68);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;94,44 3.5. Real estate activities (CNAE 68);G.1.J % of enterprises with an ICT risk assessment (1);Total;45,86 3.5. Real estate activities (CNAE 68);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;44,08 3.5. Real estate activities (CNAE 68);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;70,5 3.5. Real estate activities (CNAE 68);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;85 3.5. Real estate activities (CNAE 68);G.1.K % of enterprises with an ICT security test (1);Total;49,79 3.5. Real estate activities (CNAE 68);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;47,69 3.5. Real estate activities (CNAE 68);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;80,75 3.5. Real estate activities (CNAE 68);G.1.K % of enterprises with an ICT security test (1);250 or more;88,89 3.5. Real estate activities (CNAE 68);G.2.A % of enterprises with voluntary ICT security training;Total;58,55 3.5. Real estate activities (CNAE 68);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;57,08 3.5. Real estate activities (CNAE 68);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;78,43 3.5. Real estate activities (CNAE 68);G.2.A % of enterprises with voluntary ICT security training;250 or more;88,89 3.5. Real estate activities (CNAE 68);G.2.B % of enterprises with obligations training on ICT security;Total;39,31 3.5. Real estate activities (CNAE 68);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;38,03 3.5. Real estate activities (CNAE 68);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;53,15 3.5. Real estate activities (CNAE 68);G.2.B % of enterprises with obligations training on ICT security;250 or more;79,44 3.5. Real estate activities (CNAE 68);G.2.C % of enterprises with ICT security obligations by contract;Total;41,32 3.5. Real estate activities (CNAE 68);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;41,01 3.5. Real estate activities (CNAE 68);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;42,08 3.5. Real estate activities (CNAE 68);G.2.C % of enterprises with ICT security obligations by contract;250 or more;61,64 3.5. Real estate activities (CNAE 68);G.3 % of enterprises with ICT security documentation;Total;51,63 3.5. Real estate activities (CNAE 68);G.3 % of enterprises with ICT security documentation;From 10 to 49;50,58 3.5. Real estate activities (CNAE 68);G.3 % of enterprises with ICT security documentation;From 50 to 249;63,12 3.5. Real estate activities (CNAE 68);G.3 % of enterprises with ICT security documentation;250 or more;83,33 3.5. Real estate activities (CNAE 68);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;79,12 3.5. Real estate activities (CNAE 68);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;79,05 3.5. Real estate activities (CNAE 68);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;79,26 3.5. Real estate activities (CNAE 68);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;82 3.5. Real estate activities (CNAE 68);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;16,55 3.5. Real estate activities (CNAE 68);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;16,23 3.5. Real estate activities (CNAE 68);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;20,74 3.5. Real estate activities (CNAE 68);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;18 3.5. Real estate activities (CNAE 68);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;4,33 3.5. Real estate activities (CNAE 68);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;4,72 3.5. Real estate activities (CNAE 68);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;0 3.5. Real estate activities (CNAE 68);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;0 3.5. Real estate activities (CNAE 68);G.5 % of enterprises with a security incident;Total;33,49 3.5. Real estate activities (CNAE 68);G.5 % of enterprises with a security incident;From 10 to 49;32,91 3.5. Real estate activities (CNAE 68);G.5 % of enterprises with a security incident;From 50 to 249;39,93 3.5. Real estate activities (CNAE 68);G.5 % of enterprises with a security incident;250 or more;51,14 3.5. Real estate activities (CNAE 68);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;90,03 3.5. Real estate activities (CNAE 68);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;90,55 3.5. Real estate activities (CNAE 68);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;82,4 3.5. Real estate activities (CNAE 68);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;89,13 3.5. Real estate activities (CNAE 68);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;56,88 3.5. Real estate activities (CNAE 68);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;60,04 3.5. Real estate activities (CNAE 68);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;15,7 3.5. Real estate activities (CNAE 68);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;34,81 3.5. Real estate activities (CNAE 68);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;4,26 3.5. Real estate activities (CNAE 68);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;3 3.5. Real estate activities (CNAE 68);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;14,63 3.5. Real estate activities (CNAE 68);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;32,6 3.5. Real estate activities (CNAE 68);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;3,73 3.5. Real estate activities (CNAE 68);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;2,31 3.5. Real estate activities (CNAE 68);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;19,05 3.5. Real estate activities (CNAE 68);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;23,94 3.5. Real estate activities (CNAE 68);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;4,31 3.5. Real estate activities (CNAE 68);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;4,46 3.5. Real estate activities (CNAE 68);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;3,39 3.5. Real estate activities (CNAE 68);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;0 3.5. Real estate activities (CNAE 68);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;0 3.5. Real estate activities (CNAE 68);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;0 3.5. Real estate activities (CNAE 68);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;0 3.5. Real estate activities (CNAE 68);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;0 3.5. Real estate activities (CNAE 68);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;55,55 3.5. Real estate activities (CNAE 68);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;54,82 3.5. Real estate activities (CNAE 68);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;60,93 3.5. Real estate activities (CNAE 68);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;88,89 3.5. Real estate activities (CNAE 68);G.6.B % of enterprises whose ICT security is handled by external providers;Total;84,33 3.5. Real estate activities (CNAE 68);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;84,66 3.5. Real estate activities (CNAE 68);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;77,25 3.5. Real estate activities (CNAE 68);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;88,89 3.5. Real estate activities (CNAE 68);G.7 % of enterprises that have insurance against ICT security incidents;Total;32,76 3.5. Real estate activities (CNAE 68);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;31,03 3.5. Real estate activities (CNAE 68);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;57,51 3.5. Real estate activities (CNAE 68);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;62,77 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1 % of enterprises that apply some ICT security measure;Total;97,09 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;96,98 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;97,18 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1 % of enterprises that apply some ICT security measure;250 or more;99,7 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.A % of enterprises with strong password authentication (1);Total;93,07 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;91,87 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;99,1 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.A % of enterprises with strong password authentication (1);250 or more;99,27 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.B % of enterprises with biometric authentication (1);Total;21,41 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;17,96 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;35,44 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.B % of enterprises with biometric authentication (1);250 or more;53,16 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;36,09 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;30,14 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;64,03 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;75,72 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.D % of enterprises with encryption techniques (1);Total;54,02 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;48,52 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;79,88 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.D % of enterprises with encryption techniques (1);250 or more;90,75 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.E % of enterprises with data backup in a separate location (1);Total;95,14 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;94,54 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;98,15 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.E % of enterprises with data backup in a separate location (1);250 or more;98,29 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.F % of enterprises with control of network access (1);Total;86 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.F % of enterprises with control of network access (1);From 10 to 49;83,74 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.F % of enterprises with control of network access (1);From 50 to 249;97,55 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.F % of enterprises with control of network access (1);250 or more;97,34 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.G % of enterprises with a Virtual Private Network (1);Total;71,09 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;67,04 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;89,95 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;98,79 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.H % of enterprises with an ICT security monitoring system;Total;54,88 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;48,92 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;83,19 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.H % of enterprises with an ICT security monitoring system;250 or more;93,54 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;57,26 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;51,75 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;82,7 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;95,69 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.J % of enterprises with an ICT risk assessment (1);Total;47,27 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;40,77 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;78,06 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;89,82 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.K % of enterprises with an ICT security test (1);Total;50,47 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;45,63 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;71,94 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.K % of enterprises with an ICT security test (1);250 or more;87,87 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.A % of enterprises with voluntary ICT security training;Total;63,59 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;59,09 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;85,69 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.A % of enterprises with voluntary ICT security training;250 or more;90,62 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.B % of enterprises with obligations training on ICT security;Total;34,07 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;29,01 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;56,36 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.B % of enterprises with obligations training on ICT security;250 or more;75,06 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.C % of enterprises with ICT security obligations by contract;Total;34,46 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;31,01 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;49,23 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.C % of enterprises with ICT security obligations by contract;250 or more;64,45 3.6. Professional, scientific and technical activities (CNAE 69-75);G.3 % of enterprises with ICT security documentation;Total;51,37 3.6. Professional, scientific and technical activities (CNAE 69-75);G.3 % of enterprises with ICT security documentation;From 10 to 49;46,23 3.6. Professional, scientific and technical activities (CNAE 69-75);G.3 % of enterprises with ICT security documentation;From 50 to 249;74,74 3.6. Professional, scientific and technical activities (CNAE 69-75);G.3 % of enterprises with ICT security documentation;250 or more;90,27 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;60,34 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;59,4 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;61,41 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;69,34 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;26,52 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;28,46 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;20,48 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;21,1 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;13,14 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;12,14 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;18,11 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;9,56 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5 % of enterprises with a security incident;Total;22,55 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5 % of enterprises with a security incident;From 10 to 49;20,24 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5 % of enterprises with a security incident;From 50 to 249;30,58 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5 % of enterprises with a security incident;250 or more;50,35 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;81,41 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;79,96 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;87,07 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;82,45 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;17,89 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;16,48 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;17,73 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;33,3 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;16,82 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;15,62 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;19,77 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;22,08 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;15,63 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;16,36 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;11,38 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;18,56 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;11,67 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;11,65 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;10,96 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;13,77 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;5,12 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;4,81 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;3,76 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;11,94 3.6. Professional, scientific and technical activities (CNAE 69-75);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;51,57 3.6. Professional, scientific and technical activities (CNAE 69-75);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;45,4 3.6. Professional, scientific and technical activities (CNAE 69-75);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;81,34 3.6. Professional, scientific and technical activities (CNAE 69-75);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;90,77 3.6. Professional, scientific and technical activities (CNAE 69-75);G.6.B % of enterprises whose ICT security is handled by external providers;Total;71,79 3.6. Professional, scientific and technical activities (CNAE 69-75);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;71,49 3.6. Professional, scientific and technical activities (CNAE 69-75);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;71,93 3.6. Professional, scientific and technical activities (CNAE 69-75);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;79,19 3.6. Professional, scientific and technical activities (CNAE 69-75);G.7 % of enterprises that have insurance against ICT security incidents;Total;34,64 3.6. Professional, scientific and technical activities (CNAE 69-75);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;31,49 3.6. Professional, scientific and technical activities (CNAE 69-75);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;46,75 3.6. Professional, scientific and technical activities (CNAE 69-75);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;67,51 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1 % of enterprises that apply some ICT security measure;Total;80,18 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;77,54 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;86,83 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1 % of enterprises that apply some ICT security measure;250 or more;96,83 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.A % of enterprises with strong password authentication (1);Total;87,5 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;86,22 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;89,32 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.A % of enterprises with strong password authentication (1);250 or more;97,29 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.B % of enterprises with biometric authentication (1);Total;19,96 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;19,2 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;16,69 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.B % of enterprises with biometric authentication (1);250 or more;39,5 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;27,92 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;26,17 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;27,49 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;50,43 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.D % of enterprises with encryption techniques (1);Total;37,07 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;35,26 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;35,74 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.D % of enterprises with encryption techniques (1);250 or more;63,17 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.E % of enterprises with data backup in a separate location (1);Total;89 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;86,51 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;96,06 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.E % of enterprises with data backup in a separate location (1);250 or more;97,14 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.F % of enterprises with control of network access (1);Total;63,98 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.F % of enterprises with control of network access (1);From 10 to 49;60,46 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.F % of enterprises with control of network access (1);From 50 to 249;70,1 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.F % of enterprises with control of network access (1);250 or more;87,59 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.G % of enterprises with a Virtual Private Network (1);Total;43,21 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;38,4 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;50,03 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;80,17 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.H % of enterprises with an ICT security monitoring system;Total;39,93 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;36,48 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;44,78 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.H % of enterprises with an ICT security monitoring system;250 or more;66,61 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;33,48 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;30,06 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;37,04 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;63,75 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.J % of enterprises with an ICT risk assessment (1);Total;27,31 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;22,85 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;33,86 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;60,91 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.K % of enterprises with an ICT security test (1);Total;33,44 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;30,2 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;35,59 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.K % of enterprises with an ICT security test (1);250 or more;65,9 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.A % of enterprises with voluntary ICT security training;Total;35,63 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;31,89 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;42,07 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.A % of enterprises with voluntary ICT security training;250 or more;69,85 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.B % of enterprises with obligations training on ICT security;Total;18,08 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;15,57 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;20,86 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.B % of enterprises with obligations training on ICT security;250 or more;46,43 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.C % of enterprises with ICT security obligations by contract;Total;20,14 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;18,14 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;23,22 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.C % of enterprises with ICT security obligations by contract;250 or more;39,78 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.3 % of enterprises with ICT security documentation;Total;28,35 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.3 % of enterprises with ICT security documentation;From 10 to 49;25,57 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.3 % of enterprises with ICT security documentation;From 50 to 249;30,48 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.3 % of enterprises with ICT security documentation;250 or more;63,16 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;71,14 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;71,01 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;70,25 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;73,48 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;14,21 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;11,83 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;21,26 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;16,86 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;14,65 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;17,16 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;8,49 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;9,66 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5 % of enterprises with a security incident;Total;16,5 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5 % of enterprises with a security incident;From 10 to 49;15,11 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5 % of enterprises with a security incident;From 50 to 249;19,45 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5 % of enterprises with a security incident;250 or more;27,3 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;72,98 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;70,2 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;82,01 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;73,76 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;25,26 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;21,86 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;32,36 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;36,02 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;26,74 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;29,45 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;23,46 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;12,15 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;21,8 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;23,83 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;18,28 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;13,51 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;7,69 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;7,21 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;10,43 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;4,87 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;4,44 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;3,55 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;6,46 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;6,96 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;38,21 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;36,54 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;38,23 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;63,51 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.6.B % of enterprises whose ICT security is handled by external providers;Total;56,26 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;52,95 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;64,93 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;76,13 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.7 % of enterprises that have insurance against ICT security incidents;Total;18,74 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;16,08 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;24,03 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;40,46 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1 % of enterprises that apply some ICT security measure;Total;98,67 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;98,26 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;99,9 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1 % of enterprises that apply some ICT security measure;250 or more;100 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.A % of enterprises with strong password authentication (1);Total;98,42 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;98,12 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;99,37 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.A % of enterprises with strong password authentication (1);250 or more;99,09 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.B % of enterprises with biometric authentication (1);Total;35,6 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;31,46 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;43,88 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.B % of enterprises with biometric authentication (1);250 or more;65,63 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;55,06 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;48,86 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;71,25 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;83,29 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.D % of enterprises with encryption techniques (1);Total;71,67 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;66,91 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;83,74 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.D % of enterprises with encryption techniques (1);250 or more;94,86 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.E % of enterprises with data backup in a separate location (1);Total;98,22 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;98,08 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;98,52 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.E % of enterprises with data backup in a separate location (1);250 or more;99,13 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.F % of enterprises with control of network access (1);Total;88,01 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.F % of enterprises with control of network access (1);From 10 to 49;86,47 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.F % of enterprises with control of network access (1);From 50 to 249;91,22 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.F % of enterprises with control of network access (1);250 or more;98,64 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.G % of enterprises with a Virtual Private Network (1);Total;79,59 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;74,97 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;92,24 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;98 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.H % of enterprises with an ICT security monitoring system;Total;73,84 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;71,31 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;78,57 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.H % of enterprises with an ICT security monitoring system;250 or more;93,74 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;72,76 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;67,64 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;86,57 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;94,21 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.J % of enterprises with an ICT risk assessment (1);Total;63,68 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;57,32 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;80,14 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;93,4 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.K % of enterprises with an ICT security test (1);Total;65,68 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;60,45 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;78,5 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.K % of enterprises with an ICT security test (1);250 or more;93,18 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.A % of enterprises with voluntary ICT security training;Total;77,88 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;74,74 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;85,69 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.A % of enterprises with voluntary ICT security training;250 or more;94,67 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.B % of enterprises with obligations training on ICT security;Total;50,71 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;44,09 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;66,7 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.B % of enterprises with obligations training on ICT security;250 or more;88,51 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.C % of enterprises with ICT security obligations by contract;Total;48,72 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;44,81 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;58,04 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.C % of enterprises with ICT security obligations by contract;250 or more;71,56 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.3 % of enterprises with ICT security documentation;Total;70,71 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.3 % of enterprises with ICT security documentation;From 10 to 49;65,89 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.3 % of enterprises with ICT security documentation;From 50 to 249;83,74 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.3 % of enterprises with ICT security documentation;250 or more;91,88 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;75,26 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;72,75 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;81,72 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;78,71 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;15,81 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;16,97 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;13,02 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;13,52 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;8,93 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;10,28 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;5,26 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;7,78 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5 % of enterprises with a security incident;Total;22,7 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5 % of enterprises with a security incident;From 10 to 49;18,59 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5 % of enterprises with a security incident;From 50 to 249;33,55 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5 % of enterprises with a security incident;250 or more;42,08 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;81,57 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;80,47 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;84,78 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;78,17 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;23,49 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;20,06 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;27,89 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;32,82 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;23,75 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;26,1 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;19,12 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;23,12 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;13,99 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;11,64 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;16,21 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;23,17 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;7,16 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;5,89 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;9,82 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;6,97 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;8,15 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;8,33 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;6,68 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;12,11 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;83,97 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;81,45 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;90,62 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;95,93 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.6.B % of enterprises whose ICT security is handled by external providers;Total;40,56 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;37,7 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;45,42 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;66,21 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.7 % of enterprises that have insurance against ICT security incidents;Total;45,49 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;41,79 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;52,35 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;75,98