Activity grouping (except CNAE 56, 64-66 and 95.1);Main variables;Size of the enterprise;Total Total Enterprises;G.1 % of enterprises that apply some ICT security measure;Total;89.07 Total Enterprises;G.1 % of enterprises that apply some ICT security measure;From 10 to 49;87.93 Total Enterprises;G.1 % of enterprises that apply some ICT security measure;From 50 to 249;93.96 Total Enterprises;G.1 % of enterprises that apply some ICT security measure;250 or more;97.78 Total Enterprises;G.1.A % of enterprises with strong password authentication (1);Total;89.04 Total Enterprises;G.1.A % of enterprises with strong password authentication (1);From 10 to 49;87.74 Total Enterprises;G.1.A % of enterprises with strong password authentication (1);From 50 to 249;94.35 Total Enterprises;G.1.A % of enterprises with strong password authentication (1);250 or more;97.60 Total Enterprises;G.1.B % of enterprises with biometric authentication (1);Total;17.58 Total Enterprises;G.1.B % of enterprises with biometric authentication (1);From 10 to 49;15.12 Total Enterprises;G.1.B % of enterprises with biometric authentication (1);From 50 to 249;26.08 Total Enterprises;G.1.B % of enterprises with biometric authentication (1);250 or more;41.09 Total Enterprises;G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;24.86 Total Enterprises;G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;20.82 Total Enterprises;G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;39.29 Total Enterprises;G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;61.14 Total Enterprises;G.1.D % of enterprises with encryption techniques (1);Total;34.76 Total Enterprises;G.1.D % of enterprises with encryption techniques (1);From 10 to 49;30.20 Total Enterprises;G.1.D % of enterprises with encryption techniques (1);From 50 to 249;51.32 Total Enterprises;G.1.D % of enterprises with encryption techniques (1);250 or more;74.33 Total Enterprises;G.1.E % of enterprises with data backup in a separate location (1);Total;90.61 Total Enterprises;G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;89.51 Total Enterprises;G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;95.23 Total Enterprises;G.1.E % of enterprises with data backup in a separate location (1);250 or more;97.05 Total Enterprises;G.1.F % of enterprises with control of network access (1);Total;70.26 Total Enterprises;G.1.F % of enterprises with control of network access (1);From 10 to 49;66.63 Total Enterprises;G.1.F % of enterprises with control of network access (1);From 50 to 249;85.18 Total Enterprises;G.1.F % of enterprises with control of network access (1);250 or more;93.05 Total Enterprises;G.1.G % of enterprises with a Virtual Private Network (1);Total;51.50 Total Enterprises;G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;45.47 Total Enterprises;G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;75.83 Total Enterprises;G.1.G % of enterprises with a Virtual Private Network (1);250 or more;91.91 Total Enterprises;G.1.H % of enterprises with an ICT security monitoring system;Total;39.75 Total Enterprises;G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;34.45 Total Enterprises;G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;60.20 Total Enterprises;G.1.H % of enterprises with an ICT security monitoring system;250 or more;79.81 Total Enterprises;G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;36.79 Total Enterprises;G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;30.92 Total Enterprises;G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;59.27 Total Enterprises;G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;82.36 Total Enterprises;G.1.J % of enterprises with an ICT risk assessment (1);Total;28.29 Total Enterprises;G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;22.98 Total Enterprises;G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;47.93 Total Enterprises;G.1.J % of enterprises with an ICT risk assessment (1);250 or more;72.79 Total Enterprises;G.1.K % of enterprises with an ICT security test (1);Total;33.56 Total Enterprises;G.1.K % of enterprises with an ICT security test (1);From 10 to 49;28.52 Total Enterprises;G.1.K % of enterprises with an ICT security test (1);From 50 to 249;52.15 Total Enterprises;G.1.K % of enterprises with an ICT security test (1);250 or more;76.12 Total Enterprises;G.2.A % of enterprises with voluntary ICT security training;Total;40.82 Total Enterprises;G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;36.78 Total Enterprises;G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;56.78 Total Enterprises;G.2.A % of enterprises with voluntary ICT security training;250 or more;78.40 Total Enterprises;G.2.B % of enterprises with obligations training on ICT security;Total;19.57 Total Enterprises;G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;16.11 Total Enterprises;G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;32.55 Total Enterprises;G.2.B % of enterprises with obligations training on ICT security;250 or more;55.13 Total Enterprises;G.2.C % of enterprises with ICT security obligations by contract;Total;20.05 Total Enterprises;G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;17.55 Total Enterprises;G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;30.24 Total Enterprises;G.2.C % of enterprises with ICT security obligations by contract;250 or more;41.77 Total Enterprises;G.3 % of enterprises with ICT security documentation;Total;28.51 Total Enterprises;G.3 % of enterprises with ICT security documentation;From 10 to 49;24.31 Total Enterprises;G.3 % of enterprises with ICT security documentation;From 50 to 249;44.32 Total Enterprises;G.3 % of enterprises with ICT security documentation;250 or more;71.68 Total Enterprises;G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;67.58 Total Enterprises;G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;65.68 Total Enterprises;G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;69.85 Total Enterprises;G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;79.41 Total Enterprises;G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;21.39 Total Enterprises;G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;22.54 Total Enterprises;G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;19.78 Total Enterprises;G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;14.96 Total Enterprises;G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;11.03 Total Enterprises;G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;11.77 Total Enterprises;G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;10.37 Total Enterprises;G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;5.63 Total Enterprises;G.5 % of enterprises with a security incident;Total;15.47 Total Enterprises;G.5 % of enterprises with a security incident;From 10 to 49;13.78 Total Enterprises;G.5 % of enterprises with a security incident;From 50 to 249;22.82 Total Enterprises;G.5 % of enterprises with a security incident;250 or more;27.65 Total Enterprises;G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;74.63 Total Enterprises;G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;72.81 Total Enterprises;G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;80.43 Total Enterprises;G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;76.94 Total Enterprises;G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;21.37 Total Enterprises;G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;20.68 Total Enterprises;G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;22.44 Total Enterprises;G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;27.03 Total Enterprises;G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;20.08 Total Enterprises;G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;21.13 Total Enterprises;G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;17.28 Total Enterprises;G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;16.35 Total Enterprises;G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;16.79 Total Enterprises;G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;17.86 Total Enterprises;G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;13.51 Total Enterprises;G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;14.99 Total Enterprises;G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;8.13 Total Enterprises;G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;7.77 Total Enterprises;G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;9.30 Total Enterprises;G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;8.48 Total Enterprises;G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;3.95 Total Enterprises;G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;2.91 Total Enterprises;G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;6.89 Total Enterprises;G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;6.84 Total Enterprises;G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;37.90 Total Enterprises;G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;33.29 Total Enterprises;G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;55.95 Total Enterprises;G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;81.94 Total Enterprises;G.6.B % of enterprises whose ICT security is handled by external providers;Total;64.74 Total Enterprises;G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;64.35 Total Enterprises;G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;66.74 Total Enterprises;G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;66.03 Total Enterprises;G.7 % of enterprises that have insurance against ICT security incidents;Total;20.83 Total Enterprises;G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;18.36 Total Enterprises;G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;30.70 Total Enterprises;G.7 % of enterprises that have insurance against ICT security incidents;250 or more;43.29 1. Total Industry (CNAE 10-39);G.1 % of enterprises that apply some ICT security measure;Total;87.21 1. Total Industry (CNAE 10-39);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;85.36 1. Total Industry (CNAE 10-39);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;94.64 1. Total Industry (CNAE 10-39);G.1 % of enterprises that apply some ICT security measure;250 or more;98.25 1. Total Industry (CNAE 10-39);G.1.A % of enterprises with strong password authentication (1);Total;86.18 1. Total Industry (CNAE 10-39);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;83.77 1. Total Industry (CNAE 10-39);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;94.78 1. Total Industry (CNAE 10-39);G.1.A % of enterprises with strong password authentication (1);250 or more;99.06 1. Total Industry (CNAE 10-39);G.1.B % of enterprises with biometric authentication (1);Total;17.31 1. Total Industry (CNAE 10-39);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;13.64 1. Total Industry (CNAE 10-39);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;28.94 1. Total Industry (CNAE 10-39);G.1.B % of enterprises with biometric authentication (1);250 or more;44.17 1. Total Industry (CNAE 10-39);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;20.75 1. Total Industry (CNAE 10-39);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;15.26 1. Total Industry (CNAE 10-39);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;36.45 1. Total Industry (CNAE 10-39);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;68.89 1. Total Industry (CNAE 10-39);G.1.D % of enterprises with encryption techniques (1);Total;29.23 1. Total Industry (CNAE 10-39);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;23.54 1. Total Industry (CNAE 10-39);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;45.98 1. Total Industry (CNAE 10-39);G.1.D % of enterprises with encryption techniques (1);250 or more;76.91 1. Total Industry (CNAE 10-39);G.1.E % of enterprises with data backup in a separate location (1);Total;89.19 1. Total Industry (CNAE 10-39);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;87.64 1. Total Industry (CNAE 10-39);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;94.75 1. Total Industry (CNAE 10-39);G.1.E % of enterprises with data backup in a separate location (1);250 or more;97.63 1. Total Industry (CNAE 10-39);G.1.F % of enterprises with control of network access (1);Total;67.67 1. Total Industry (CNAE 10-39);G.1.F % of enterprises with control of network access (1);From 10 to 49;62.46 1. Total Industry (CNAE 10-39);G.1.F % of enterprises with control of network access (1);From 50 to 249;86.20 1. Total Industry (CNAE 10-39);G.1.F % of enterprises with control of network access (1);250 or more;96.05 1. Total Industry (CNAE 10-39);G.1.G % of enterprises with a Virtual Private Network (1);Total;45.88 1. Total Industry (CNAE 10-39);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;36.82 1. Total Industry (CNAE 10-39);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;77.87 1. Total Industry (CNAE 10-39);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;96.24 1. Total Industry (CNAE 10-39);G.1.H % of enterprises with an ICT security monitoring system;Total;35.21 1. Total Industry (CNAE 10-39);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;27.99 1. Total Industry (CNAE 10-39);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;59.10 1. Total Industry (CNAE 10-39);G.1.H % of enterprises with an ICT security monitoring system;250 or more;83.32 1. Total Industry (CNAE 10-39);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;30.76 1. Total Industry (CNAE 10-39);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;22.20 1. Total Industry (CNAE 10-39);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;58.79 1. Total Industry (CNAE 10-39);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;88.95 1. Total Industry (CNAE 10-39);G.1.J % of enterprises with an ICT risk assessment (1);Total;23.32 1. Total Industry (CNAE 10-39);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;15.94 1. Total Industry (CNAE 10-39);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;47.16 1. Total Industry (CNAE 10-39);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;75.02 1. Total Industry (CNAE 10-39);G.1.K % of enterprises with an ICT security test (1);Total;29.05 1. Total Industry (CNAE 10-39);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;21.91 1. Total Industry (CNAE 10-39);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;52.10 1. Total Industry (CNAE 10-39);G.1.K % of enterprises with an ICT security test (1);250 or more;79.22 1. Total Industry (CNAE 10-39);G.2.A % of enterprises with voluntary ICT security training;Total;34.71 1. Total Industry (CNAE 10-39);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;28.85 1. Total Industry (CNAE 10-39);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;55.23 1. Total Industry (CNAE 10-39);G.2.A % of enterprises with voluntary ICT security training;250 or more;84.26 1. Total Industry (CNAE 10-39);G.2.B % of enterprises with obligations training on ICT security;Total;14.83 1. Total Industry (CNAE 10-39);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;10.25 1. Total Industry (CNAE 10-39);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;29.91 1. Total Industry (CNAE 10-39);G.2.B % of enterprises with obligations training on ICT security;250 or more;58.22 1. Total Industry (CNAE 10-39);G.2.C % of enterprises with ICT security obligations by contract;Total;15.20 1. Total Industry (CNAE 10-39);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;12.04 1. Total Industry (CNAE 10-39);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;26.17 1. Total Industry (CNAE 10-39);G.2.C % of enterprises with ICT security obligations by contract;250 or more;42.38 1. Total Industry (CNAE 10-39);G.3 % of enterprises with ICT security documentation;Total;23.09 1. Total Industry (CNAE 10-39);G.3 % of enterprises with ICT security documentation;From 10 to 49;17.24 1. Total Industry (CNAE 10-39);G.3 % of enterprises with ICT security documentation;From 50 to 249;42.84 1. Total Industry (CNAE 10-39);G.3 % of enterprises with ICT security documentation;250 or more;76.42 1. Total Industry (CNAE 10-39);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;64.59 1. Total Industry (CNAE 10-39);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;60.67 1. Total Industry (CNAE 10-39);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;68.58 1. Total Industry (CNAE 10-39);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;76.32 1. Total Industry (CNAE 10-39);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;20.36 1. Total Industry (CNAE 10-39);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;20.80 1. Total Industry (CNAE 10-39);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;20.72 1. Total Industry (CNAE 10-39);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;16.80 1. Total Industry (CNAE 10-39);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;15.05 1. Total Industry (CNAE 10-39);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;18.53 1. Total Industry (CNAE 10-39);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;10.70 1. Total Industry (CNAE 10-39);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;6.88 1. Total Industry (CNAE 10-39);G.5 % of enterprises with a security incident;Total;14.04 1. Total Industry (CNAE 10-39);G.5 % of enterprises with a security incident;From 10 to 49;11.81 1. Total Industry (CNAE 10-39);G.5 % of enterprises with a security incident;From 50 to 249;22.38 1. Total Industry (CNAE 10-39);G.5 % of enterprises with a security incident;250 or more;30.05 1. Total Industry (CNAE 10-39);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;73.60 1. Total Industry (CNAE 10-39);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;69.84 1. Total Industry (CNAE 10-39);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;82.50 1. Total Industry (CNAE 10-39);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;78.94 1. Total Industry (CNAE 10-39);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;20.55 1. Total Industry (CNAE 10-39);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;20.90 1. Total Industry (CNAE 10-39);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;19.54 1. Total Industry (CNAE 10-39);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;20.74 1. Total Industry (CNAE 10-39);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;18.46 1. Total Industry (CNAE 10-39);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;21.24 1. Total Industry (CNAE 10-39);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;11.72 1. Total Industry (CNAE 10-39);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;15.05 1. Total Industry (CNAE 10-39);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;17.34 1. Total Industry (CNAE 10-39);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;20.52 1. Total Industry (CNAE 10-39);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;9.19 1. Total Industry (CNAE 10-39);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;15.15 1. Total Industry (CNAE 10-39);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;8.95 1. Total Industry (CNAE 10-39);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;9.67 1. Total Industry (CNAE 10-39);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;6.89 1. Total Industry (CNAE 10-39);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;9.25 1. Total Industry (CNAE 10-39);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;3.86 1. Total Industry (CNAE 10-39);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;3.81 1. Total Industry (CNAE 10-39);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;3.47 1. Total Industry (CNAE 10-39);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;5.75 1. Total Industry (CNAE 10-39);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;32.81 1. Total Industry (CNAE 10-39);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;26.03 1. Total Industry (CNAE 10-39);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;56.85 1. Total Industry (CNAE 10-39);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;88.75 1. Total Industry (CNAE 10-39);G.6.B % of enterprises whose ICT security is handled by external providers;Total;67.01 1. Total Industry (CNAE 10-39);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;66.11 1. Total Industry (CNAE 10-39);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;70.87 1. Total Industry (CNAE 10-39);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;71.13 1. Total Industry (CNAE 10-39);G.7 % of enterprises that have insurance against ICT security incidents;Total;18.12 1. Total Industry (CNAE 10-39);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;15.32 1. Total Industry (CNAE 10-39);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;27.81 1. Total Industry (CNAE 10-39);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;42.49 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1 % of enterprises that apply some ICT security measure;Total;82.65 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;80.66 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;92.51 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1 % of enterprises that apply some ICT security measure;250 or more;96.52 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.A % of enterprises with strong password authentication (1);Total;85.23 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;83.42 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;92.43 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.A % of enterprises with strong password authentication (1);250 or more;98.98 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.B % of enterprises with biometric authentication (1);Total;14.71 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;11.34 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;27.17 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.B % of enterprises with biometric authentication (1);250 or more;45.28 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;15.78 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;11.88 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;27.85 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;63.56 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.D % of enterprises with encryption techniques (1);Total;24.69 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;20.76 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;37.99 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.D % of enterprises with encryption techniques (1);250 or more;66.76 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.E % of enterprises with data backup in a separate location (1);Total;83.87 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;81.53 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;94.32 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.E % of enterprises with data backup in a separate location (1);250 or more;95.79 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.F % of enterprises with control of network access (1);Total;61.17 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.F % of enterprises with control of network access (1);From 10 to 49;56.15 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.F % of enterprises with control of network access (1);From 50 to 249;82.15 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.F % of enterprises with control of network access (1);250 or more;94.37 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.G % of enterprises with a Virtual Private Network (1);Total;36.50 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;29.01 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;66.27 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;93.74 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.H % of enterprises with an ICT security monitoring system;Total;28.57 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;22.71 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;51.30 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.H % of enterprises with an ICT security monitoring system;250 or more;76.31 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;24.16 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;16.86 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;52.43 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;84.08 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.J % of enterprises with an ICT risk assessment (1);Total;17.02 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;10.64 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;42.60 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;64.50 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.K % of enterprises with an ICT security test (1);Total;23.71 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;17.23 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;50.09 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.1.K % of enterprises with an ICT security test (1);250 or more;69.97 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.A % of enterprises with voluntary ICT security training;Total;32.50 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;28.70 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;48.59 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.A % of enterprises with voluntary ICT security training;250 or more;73.81 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.B % of enterprises with obligations training on ICT security;Total;11.65 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;8.93 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;23.06 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.B % of enterprises with obligations training on ICT security;250 or more;41.95 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.C % of enterprises with ICT security obligations by contract;Total;11.99 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;9.94 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;20.35 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.2.C % of enterprises with ICT security obligations by contract;250 or more;35.82 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.3 % of enterprises with ICT security documentation;Total;17.57 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.3 % of enterprises with ICT security documentation;From 10 to 49;13.64 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.3 % of enterprises with ICT security documentation;From 50 to 249;33.39 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.3 % of enterprises with ICT security documentation;250 or more;65.07 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;60.89 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;56.33 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;69.04 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;70.66 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;18.65 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;19.28 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;17.61 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;17.08 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;20.45 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;24.39 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;13.36 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;12.27 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5 % of enterprises with a security incident;Total;12.82 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5 % of enterprises with a security incident;From 10 to 49;11.11 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5 % of enterprises with a security incident;From 50 to 249;20.80 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5 % of enterprises with a security incident;250 or more;27.57 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;73.63 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;70.61 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;82.58 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;78.11 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;19.54 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;20.21 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;17.37 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;19.40 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;20.56 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;24.02 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;10.12 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;16.06 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;16.03 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;18.19 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;9.18 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;14.66 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;3.36 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;2.33 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;5.05 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;10.58 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;4.13 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;5.33 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;0.00 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;4.65 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;27.22 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;21.38 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;53.03 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;85.18 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.6.B % of enterprises whose ICT security is handled by external providers;Total;63.50 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;62.23 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;70.26 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;69.82 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.7 % of enterprises that have insurance against ICT security incidents;Total;16.56 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;14.54 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;25.99 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;33.66 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1 % of enterprises that apply some ICT security measure;Total;92.39 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;90.55 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;97.41 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1 % of enterprises that apply some ICT security measure;250 or more;98.90 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.A % of enterprises with strong password authentication (1);Total;88.16 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;84.95 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;95.93 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.A % of enterprises with strong password authentication (1);250 or more;100.00 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.B % of enterprises with biometric authentication (1);Total;23.77 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;18.64 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;36.64 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.B % of enterprises with biometric authentication (1);250 or more;40.81 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;26.73 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;17.53 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;46.98 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;69.19 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.D % of enterprises with encryption techniques (1);Total;35.86 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;26.10 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;56.90 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.D % of enterprises with encryption techniques (1);250 or more;82.46 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.E % of enterprises with data backup in a separate location (1);Total;92.66 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;90.80 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;97.38 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.E % of enterprises with data backup in a separate location (1);250 or more;98.62 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.F % of enterprises with control of network access (1);Total;72.38 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.F % of enterprises with control of network access (1);From 10 to 49;64.90 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.F % of enterprises with control of network access (1);From 50 to 249;91.13 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.F % of enterprises with control of network access (1);250 or more;97.21 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.G % of enterprises with a Virtual Private Network (1);Total;55.04 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;42.05 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;87.48 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;98.89 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.H % of enterprises with an ICT security monitoring system;Total;43.42 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;32.52 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;69.53 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.H % of enterprises with an ICT security monitoring system;250 or more;84.78 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;40.27 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;27.41 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;70.46 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;91.68 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.J % of enterprises with an ICT risk assessment (1);Total;33.33 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;23.39 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;55.70 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;77.05 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.K % of enterprises with an ICT security test (1);Total;36.29 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;26.08 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;58.31 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.1.K % of enterprises with an ICT security test (1);250 or more;85.02 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.A % of enterprises with voluntary ICT security training;Total;42.81 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;34.15 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;61.70 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.A % of enterprises with voluntary ICT security training;250 or more;93.00 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.B % of enterprises with obligations training on ICT security;Total;20.77 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;12.75 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;38.70 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.B % of enterprises with obligations training on ICT security;250 or more;65.53 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.C % of enterprises with ICT security obligations by contract;Total;22.65 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;16.55 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;37.72 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.2.C % of enterprises with ICT security obligations by contract;250 or more;50.61 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.3 % of enterprises with ICT security documentation;Total;31.43 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.3 % of enterprises with ICT security documentation;From 10 to 49;20.88 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.3 % of enterprises with ICT security documentation;From 50 to 249;56.47 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.3 % of enterprises with ICT security documentation;250 or more;84.20 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;66.79 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;65.91 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;63.00 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;80.77 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;20.79 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;16.36 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;29.06 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;13.92 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;12.42 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;17.73 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;7.94 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;5.31 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5 % of enterprises with a security incident;Total;16.06 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5 % of enterprises with a security incident;From 10 to 49;13.00 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5 % of enterprises with a security incident;From 50 to 249;23.71 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5 % of enterprises with a security incident;250 or more;29.78 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;77.13 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;73.33 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;84.49 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;77.34 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;20.14 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;15.67 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;29.56 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;17.80 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;16.09 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;19.29 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;11.99 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;8.91 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;13.97 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;15.84 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;10.41 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;13.67 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;12.46 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;15.60 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;6.51 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;11.80 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;4.29 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;2.06 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;8.62 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;4.31 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;37.45 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;27.26 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;61.04 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;90.76 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.6.B % of enterprises whose ICT security is handled by external providers;Total;75.11 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;75.02 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;75.65 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;74.23 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.7 % of enterprises that have insurance against ICT security incidents;Total;22.45 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;18.09 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;31.13 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;51.11 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1 % of enterprises that apply some ICT security measure;Total;86.72 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;85.22 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;95.02 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1 % of enterprises that apply some ICT security measure;250 or more;98.60 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.A % of enterprises with strong password authentication (1);Total;84.60 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;82.43 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;95.67 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.A % of enterprises with strong password authentication (1);250 or more;97.00 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.B % of enterprises with biometric authentication (1);Total;13.99 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;10.93 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;28.86 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.B % of enterprises with biometric authentication (1);250 or more;36.79 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;17.20 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;13.89 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;29.73 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;66.72 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.D % of enterprises with encryption techniques (1);Total;27.98 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;24.83 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;40.61 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.D % of enterprises with encryption techniques (1);250 or more;70.42 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.E % of enterprises with data backup in a separate location (1);Total;90.31 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;89.48 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;94.20 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.E % of enterprises with data backup in a separate location (1);250 or more;97.63 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.F % of enterprises with control of network access (1);Total;66.01 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.F % of enterprises with control of network access (1);From 10 to 49;62.40 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.F % of enterprises with control of network access (1);From 50 to 249;83.19 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.F % of enterprises with control of network access (1);250 or more;95.74 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.G % of enterprises with a Virtual Private Network (1);Total;43.48 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;36.62 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;76.86 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;94.47 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.H % of enterprises with an ICT security monitoring system;Total;31.85 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;26.28 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;57.31 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.H % of enterprises with an ICT security monitoring system;250 or more;84.63 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;24.47 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;17.79 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;55.33 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;85.66 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.J % of enterprises with an ICT risk assessment (1);Total;18.93 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;13.73 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;41.78 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;74.72 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.K % of enterprises with an ICT security test (1);Total;24.79 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;20.48 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;42.62 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.1.K % of enterprises with an ICT security test (1);250 or more;79.04 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.A % of enterprises with voluntary ICT security training;Total;27.68 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;23.62 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;47.98 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.A % of enterprises with voluntary ICT security training;250 or more;75.23 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.B % of enterprises with obligations training on ICT security;Total;11.65 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;8.84 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;24.23 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.B % of enterprises with obligations training on ICT security;250 or more;54.90 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.C % of enterprises with ICT security obligations by contract;Total;12.41 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;11.21 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;17.46 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.2.C % of enterprises with ICT security obligations by contract;250 or more;33.01 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.3 % of enterprises with ICT security documentation;Total;18.69 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.3 % of enterprises with ICT security documentation;From 10 to 49;16.04 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.3 % of enterprises with ICT security documentation;From 50 to 249;28.56 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.3 % of enterprises with ICT security documentation;250 or more;74.07 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;66.20 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;60.93 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;81.86 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;77.15 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;19.20 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;21.69 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;10.48 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;17.70 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;14.60 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;17.38 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;7.65 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;5.15 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5 % of enterprises with a security incident;Total;12.99 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5 % of enterprises with a security incident;From 10 to 49;11.47 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5 % of enterprises with a security incident;From 50 to 249;21.04 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5 % of enterprises with a security incident;250 or more;27.70 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;70.42 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;65.67 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;84.79 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;85.66 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;23.82 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;25.14 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;18.16 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;28.77 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;19.53 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;22.06 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;9.72 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;23.15 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;21.51 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;24.55 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;12.07 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;13.10 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;14.83 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;17.84 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;3.69 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;16.51 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;5.64 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;6.33 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;2.32 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;10.40 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;28.00 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;23.09 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;52.50 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;85.59 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.6.B % of enterprises whose ICT security is handled by external providers;Total;67.82 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;66.97 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;72.10 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;77.40 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.7 % of enterprises that have insurance against ICT security incidents;Total;17.23 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;14.25 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;33.35 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;43.43 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1 % of enterprises that apply some ICT security measure;Total;89.95 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;88.66 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;94.28 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1 % of enterprises that apply some ICT security measure;250 or more;99.22 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.A % of enterprises with strong password authentication (1);Total;85.46 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;82.58 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;95.55 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.A % of enterprises with strong password authentication (1);250 or more;99.17 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.B % of enterprises with biometric authentication (1);Total;18.82 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;15.94 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;25.33 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.B % of enterprises with biometric authentication (1);250 or more;48.96 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;24.44 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;18.12 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;41.96 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;75.59 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.D % of enterprises with encryption techniques (1);Total;29.78 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;22.90 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;49.50 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.D % of enterprises with encryption techniques (1);250 or more;82.51 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.E % of enterprises with data backup in a separate location (1);Total;93.70 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;93.32 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;94.34 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.E % of enterprises with data backup in a separate location (1);250 or more;98.58 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.F % of enterprises with control of network access (1);Total;72.99 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.F % of enterprises with control of network access (1);From 10 to 49;68.03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.F % of enterprises with control of network access (1);From 50 to 249;90.55 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.F % of enterprises with control of network access (1);250 or more;96.13 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.G % of enterprises with a Virtual Private Network (1);Total;51.77 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;42.19 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;85.45 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;97.34 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.H % of enterprises with an ICT security monitoring system;Total;39.98 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;32.89 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;62.03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.H % of enterprises with an ICT security monitoring system;250 or more;86.65 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;35.12 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;27.03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;59.55 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;91.67 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.J % of enterprises with an ICT risk assessment (1);Total;25.97 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;18.31 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;48.37 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;82.75 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.K % of enterprises with an ICT security test (1);Total;32.09 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;24.80 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;53.95 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.1.K % of enterprises with an ICT security test (1);250 or more;83.78 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.A % of enterprises with voluntary ICT security training;Total;35.76 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;27.93 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;62.20 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.A % of enterprises with voluntary ICT security training;250 or more;90.96 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.B % of enterprises with obligations training on ICT security;Total;16.14 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;10.44 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;33.04 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.B % of enterprises with obligations training on ICT security;250 or more;67.12 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.C % of enterprises with ICT security obligations by contract;Total;16.34 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;12.16 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;30.54 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.2.C % of enterprises with ICT security obligations by contract;250 or more;45.46 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.3 % of enterprises with ICT security documentation;Total;27.13 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.3 % of enterprises with ICT security documentation;From 10 to 49;19.58 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.3 % of enterprises with ICT security documentation;From 50 to 249;52.27 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.3 % of enterprises with ICT security documentation;250 or more;82.01 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;66.81 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;64.75 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;67.92 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;74.83 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;19.87 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;20.21 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;19.16 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;20.19 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;13.31 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;15.04 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;12.92 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;4.98 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5 % of enterprises with a security incident;Total;13.65 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5 % of enterprises with a security incident;From 10 to 49;10.39 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5 % of enterprises with a security incident;From 50 to 249;25.31 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5 % of enterprises with a security incident;250 or more;33.35 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;74.20 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;69.78 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;80.92 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;81.75 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;19.97 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;23.05 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;13.25 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;21.96 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;15.57 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;16.24 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;13.94 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;16.60 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;17.86 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;24.86 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;5.20 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;13.17 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;12.87 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;14.24 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;12.03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;6.05 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;2.20 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;0.00 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;4.79 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;8.63 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;38.76 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;31.73 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;61.68 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;91.96 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.6.B % of enterprises whose ICT security is handled by external providers;Total;67.05 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;66.93 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;67.72 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;66.66 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.7 % of enterprises that have insurance against ICT security incidents;Total;18.35 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;16.16 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;23.71 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;43.34 1.5. Energy and water (CNAE 35-39);G.1 % of enterprises that apply some ICT security measure;Total;94.61 1.5. Energy and water (CNAE 35-39);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;93.51 1.5. Energy and water (CNAE 35-39);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;97.11 1.5. Energy and water (CNAE 35-39);G.1 % of enterprises that apply some ICT security measure;250 or more;99.01 1.5. Energy and water (CNAE 35-39);G.1.A % of enterprises with strong password authentication (1);Total;94.42 1.5. Energy and water (CNAE 35-39);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;93.16 1.5. Energy and water (CNAE 35-39);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;97.23 1.5. Energy and water (CNAE 35-39);G.1.A % of enterprises with strong password authentication (1);250 or more;98.96 1.5. Energy and water (CNAE 35-39);G.1.B % of enterprises with biometric authentication (1);Total;20.01 1.5. Energy and water (CNAE 35-39);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;15.51 1.5. Energy and water (CNAE 35-39);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;27.76 1.5. Energy and water (CNAE 35-39);G.1.B % of enterprises with biometric authentication (1);250 or more;43.92 1.5. Energy and water (CNAE 35-39);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;30.78 1.5. Energy and water (CNAE 35-39);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;24.60 1.5. Energy and water (CNAE 35-39);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;40.08 1.5. Energy and water (CNAE 35-39);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;68.49 1.5. Energy and water (CNAE 35-39);G.1.D % of enterprises with encryption techniques (1);Total;40.74 1.5. Energy and water (CNAE 35-39);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;34.08 1.5. Energy and water (CNAE 35-39);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;49.68 1.5. Energy and water (CNAE 35-39);G.1.D % of enterprises with encryption techniques (1);250 or more;85.07 1.5. Energy and water (CNAE 35-39);G.1.E % of enterprises with data backup in a separate location (1);Total;90.44 1.5. Energy and water (CNAE 35-39);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;89.26 1.5. Energy and water (CNAE 35-39);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;92.05 1.5. Energy and water (CNAE 35-39);G.1.E % of enterprises with data backup in a separate location (1);250 or more;98.16 1.5. Energy and water (CNAE 35-39);G.1.F % of enterprises with control of network access (1);Total;77.82 1.5. Energy and water (CNAE 35-39);G.1.F % of enterprises with control of network access (1);From 10 to 49;74.70 1.5. Energy and water (CNAE 35-39);G.1.F % of enterprises with control of network access (1);From 50 to 249;82.12 1.5. Energy and water (CNAE 35-39);G.1.F % of enterprises with control of network access (1);250 or more;98.16 1.5. Energy and water (CNAE 35-39);G.1.G % of enterprises with a Virtual Private Network (1);Total;61.64 1.5. Energy and water (CNAE 35-39);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;53.40 1.5. Energy and water (CNAE 35-39);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;78.50 1.5. Energy and water (CNAE 35-39);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;96.32 1.5. Energy and water (CNAE 35-39);G.1.H % of enterprises with an ICT security monitoring system;Total;44.58 1.5. Energy and water (CNAE 35-39);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;36.42 1.5. Energy and water (CNAE 35-39);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;58.12 1.5. Energy and water (CNAE 35-39);G.1.H % of enterprises with an ICT security monitoring system;250 or more;89.79 1.5. Energy and water (CNAE 35-39);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;46.93 1.5. Energy and water (CNAE 35-39);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;39.19 1.5. Energy and water (CNAE 35-39);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;58.92 1.5. Energy and water (CNAE 35-39);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;92.84 1.5. Energy and water (CNAE 35-39);G.1.J % of enterprises with an ICT risk assessment (1);Total;37.63 1.5. Energy and water (CNAE 35-39);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;29.91 1.5. Energy and water (CNAE 35-39);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;50.38 1.5. Energy and water (CNAE 35-39);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;80.67 1.5. Energy and water (CNAE 35-39);G.1.K % of enterprises with an ICT security test (1);Total;42.87 1.5. Energy and water (CNAE 35-39);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;35.23 1.5. Energy and water (CNAE 35-39);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;56.85 1.5. Energy and water (CNAE 35-39);G.1.K % of enterprises with an ICT security test (1);250 or more;80.76 1.5. Energy and water (CNAE 35-39);G.2.A % of enterprises with voluntary ICT security training;Total;47.08 1.5. Energy and water (CNAE 35-39);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;40.32 1.5. Energy and water (CNAE 35-39);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;58.69 1.5. Energy and water (CNAE 35-39);G.2.A % of enterprises with voluntary ICT security training;250 or more;86.85 1.5. Energy and water (CNAE 35-39);G.2.B % of enterprises with obligations training on ICT security;Total;25.75 1.5. Energy and water (CNAE 35-39);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;18.58 1.5. Energy and water (CNAE 35-39);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;37.74 1.5. Energy and water (CNAE 35-39);G.2.B % of enterprises with obligations training on ICT security;250 or more;69.20 1.5. Energy and water (CNAE 35-39);G.2.C % of enterprises with ICT security obligations by contract;Total;21.67 1.5. Energy and water (CNAE 35-39);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;18.99 1.5. Energy and water (CNAE 35-39);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;24.31 1.5. Energy and water (CNAE 35-39);G.2.C % of enterprises with ICT security obligations by contract;250 or more;44.36 1.5. Energy and water (CNAE 35-39);G.3 % of enterprises with ICT security documentation;Total;36.07 1.5. Energy and water (CNAE 35-39);G.3 % of enterprises with ICT security documentation;From 10 to 49;29.51 1.5. Energy and water (CNAE 35-39);G.3 % of enterprises with ICT security documentation;From 50 to 249;45.88 1.5. Energy and water (CNAE 35-39);G.3 % of enterprises with ICT security documentation;250 or more;79.76 1.5. Energy and water (CNAE 35-39);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;61.92 1.5. Energy and water (CNAE 35-39);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;53.27 1.5. Energy and water (CNAE 35-39);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;70.90 1.5. Energy and water (CNAE 35-39);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;81.97 1.5. Energy and water (CNAE 35-39);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;28.60 1.5. Energy and water (CNAE 35-39);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;34.89 1.5. Energy and water (CNAE 35-39);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;22.36 1.5. Energy and water (CNAE 35-39);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;13.46 1.5. Energy and water (CNAE 35-39);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;9.48 1.5. Energy and water (CNAE 35-39);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;11.84 1.5. Energy and water (CNAE 35-39);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;6.74 1.5. Energy and water (CNAE 35-39);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;4.57 1.5. Energy and water (CNAE 35-39);G.5 % of enterprises with a security incident;Total;22.04 1.5. Energy and water (CNAE 35-39);G.5 % of enterprises with a security incident;From 10 to 49;22.17 1.5. Energy and water (CNAE 35-39);G.5 % of enterprises with a security incident;From 50 to 249;18.83 1.5. Energy and water (CNAE 35-39);G.5 % of enterprises with a security incident;250 or more;31.83 1.5. Energy and water (CNAE 35-39);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;71.24 1.5. Energy and water (CNAE 35-39);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;69.67 1.5. Energy and water (CNAE 35-39);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;77.44 1.5. Energy and water (CNAE 35-39);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;71.36 1.5. Energy and water (CNAE 35-39);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;20.58 1.5. Energy and water (CNAE 35-39);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;18.81 1.5. Energy and water (CNAE 35-39);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;27.92 1.5. Energy and water (CNAE 35-39);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;20.05 1.5. Energy and water (CNAE 35-39);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;20.20 1.5. Energy and water (CNAE 35-39);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;22.69 1.5. Energy and water (CNAE 35-39);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;13.11 1.5. Energy and water (CNAE 35-39);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;14.32 1.5. Energy and water (CNAE 35-39);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;19.62 1.5. Energy and water (CNAE 35-39);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;19.66 1.5. Energy and water (CNAE 35-39);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;16.31 1.5. Energy and water (CNAE 35-39);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;26.13 1.5. Energy and water (CNAE 35-39);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;2.62 1.5. Energy and water (CNAE 35-39);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;2.90 1.5. Energy and water (CNAE 35-39);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;1.37 1.5. Energy and water (CNAE 35-39);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;2.86 1.5. Energy and water (CNAE 35-39);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;2.83 1.5. Energy and water (CNAE 35-39);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;3.88 1.5. Energy and water (CNAE 35-39);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;0.00 1.5. Energy and water (CNAE 35-39);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;0.00 1.5. Energy and water (CNAE 35-39);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;49.36 1.5. Energy and water (CNAE 35-39);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;44.23 1.5. Energy and water (CNAE 35-39);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;55.37 1.5. Energy and water (CNAE 35-39);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;89.58 1.5. Energy and water (CNAE 35-39);G.6.B % of enterprises whose ICT security is handled by external providers;Total;66.51 1.5. Energy and water (CNAE 35-39);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;65.27 1.5. Energy and water (CNAE 35-39);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;68.94 1.5. Energy and water (CNAE 35-39);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;72.78 1.5. Energy and water (CNAE 35-39);G.7 % of enterprises that have insurance against ICT security incidents;Total;19.31 1.5. Energy and water (CNAE 35-39);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;14.15 1.5. Energy and water (CNAE 35-39);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;29.45 1.5. Energy and water (CNAE 35-39);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;45.31 2. Total Construction (CNAE 41-43);G.1 % of enterprises that apply some ICT security measure;Total;85.69 2. Total Construction (CNAE 41-43);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;85.03 2. Total Construction (CNAE 41-43);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;91.94 2. Total Construction (CNAE 41-43);G.1 % of enterprises that apply some ICT security measure;250 or more;95.82 2. Total Construction (CNAE 41-43);G.1.A % of enterprises with strong password authentication (1);Total;87.01 2. Total Construction (CNAE 41-43);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;86.23 2. Total Construction (CNAE 41-43);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;93.98 2. Total Construction (CNAE 41-43);G.1.A % of enterprises with strong password authentication (1);250 or more;95.53 2. Total Construction (CNAE 41-43);G.1.B % of enterprises with biometric authentication (1);Total;11.44 2. Total Construction (CNAE 41-43);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;10.81 2. Total Construction (CNAE 41-43);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;15.31 2. Total Construction (CNAE 41-43);G.1.B % of enterprises with biometric authentication (1);250 or more;38.15 2. Total Construction (CNAE 41-43);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;18.65 2. Total Construction (CNAE 41-43);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;17.60 2. Total Construction (CNAE 41-43);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;24.70 2. Total Construction (CNAE 41-43);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;66.48 2. Total Construction (CNAE 41-43);G.1.D % of enterprises with encryption techniques (1);Total;23.23 2. Total Construction (CNAE 41-43);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;21.31 2. Total Construction (CNAE 41-43);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;37.50 2. Total Construction (CNAE 41-43);G.1.D % of enterprises with encryption techniques (1);250 or more;74.84 2. Total Construction (CNAE 41-43);G.1.E % of enterprises with data backup in a separate location (1);Total;86.50 2. Total Construction (CNAE 41-43);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;85.77 2. Total Construction (CNAE 41-43);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;93.20 2. Total Construction (CNAE 41-43);G.1.E % of enterprises with data backup in a separate location (1);250 or more;92.20 2. Total Construction (CNAE 41-43);G.1.F % of enterprises with control of network access (1);Total;58.30 2. Total Construction (CNAE 41-43);G.1.F % of enterprises with control of network access (1);From 10 to 49;55.99 2. Total Construction (CNAE 41-43);G.1.F % of enterprises with control of network access (1);From 50 to 249;78.16 2. Total Construction (CNAE 41-43);G.1.F % of enterprises with control of network access (1);250 or more;92.20 2. Total Construction (CNAE 41-43);G.1.G % of enterprises with a Virtual Private Network (1);Total;37.26 2. Total Construction (CNAE 41-43);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;34.55 2. Total Construction (CNAE 41-43);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;58.98 2. Total Construction (CNAE 41-43);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;94.70 2. Total Construction (CNAE 41-43);G.1.H % of enterprises with an ICT security monitoring system;Total;23.57 2. Total Construction (CNAE 41-43);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;21.43 2. Total Construction (CNAE 41-43);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;39.94 2. Total Construction (CNAE 41-43);G.1.H % of enterprises with an ICT security monitoring system;250 or more;77.60 2. Total Construction (CNAE 41-43);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;18.29 2. Total Construction (CNAE 41-43);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;15.57 2. Total Construction (CNAE 41-43);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;39.65 2. Total Construction (CNAE 41-43);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;80.96 2. Total Construction (CNAE 41-43);G.1.J % of enterprises with an ICT risk assessment (1);Total;12.25 2. Total Construction (CNAE 41-43);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;9.86 2. Total Construction (CNAE 41-43);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;30.93 2. Total Construction (CNAE 41-43);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;68.04 2. Total Construction (CNAE 41-43);G.1.K % of enterprises with an ICT security test (1);Total;18.48 2. Total Construction (CNAE 41-43);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;16.60 2. Total Construction (CNAE 41-43);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;32.03 2. Total Construction (CNAE 41-43);G.1.K % of enterprises with an ICT security test (1);250 or more;73.99 2. Total Construction (CNAE 41-43);G.2.A % of enterprises with voluntary ICT security training;Total;29.61 2. Total Construction (CNAE 41-43);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;27.88 2. Total Construction (CNAE 41-43);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;44.40 2. Total Construction (CNAE 41-43);G.2.A % of enterprises with voluntary ICT security training;250 or more;73.84 2. Total Construction (CNAE 41-43);G.2.B % of enterprises with obligations training on ICT security;Total;11.33 2. Total Construction (CNAE 41-43);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;9.97 2. Total Construction (CNAE 41-43);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;22.15 2. Total Construction (CNAE 41-43);G.2.B % of enterprises with obligations training on ICT security;250 or more;54.52 2. Total Construction (CNAE 41-43);G.2.C % of enterprises with ICT security obligations by contract;Total;13.08 2. Total Construction (CNAE 41-43);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;11.99 2. Total Construction (CNAE 41-43);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;22.58 2. Total Construction (CNAE 41-43);G.2.C % of enterprises with ICT security obligations by contract;250 or more;38.39 2. Total Construction (CNAE 41-43);G.3 % of enterprises with ICT security documentation;Total;14.29 2. Total Construction (CNAE 41-43);G.3 % of enterprises with ICT security documentation;From 10 to 49;12.53 2. Total Construction (CNAE 41-43);G.3 % of enterprises with ICT security documentation;From 50 to 249;28.53 2. Total Construction (CNAE 41-43);G.3 % of enterprises with ICT security documentation;250 or more;68.06 2. Total Construction (CNAE 41-43);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;68.42 2. Total Construction (CNAE 41-43);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;68.18 2. Total Construction (CNAE 41-43);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;66.62 2. Total Construction (CNAE 41-43);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;82.25 2. Total Construction (CNAE 41-43);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;21.03 2. Total Construction (CNAE 41-43);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;22.13 2. Total Construction (CNAE 41-43);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;18.09 2. Total Construction (CNAE 41-43);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;10.50 2. Total Construction (CNAE 41-43);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;10.55 2. Total Construction (CNAE 41-43);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;9.69 2. Total Construction (CNAE 41-43);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;15.29 2. Total Construction (CNAE 41-43);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;7.25 2. Total Construction (CNAE 41-43);G.5 % of enterprises with a security incident;Total;11.87 2. Total Construction (CNAE 41-43);G.5 % of enterprises with a security incident;From 10 to 49;11.41 2. Total Construction (CNAE 41-43);G.5 % of enterprises with a security incident;From 50 to 249;15.43 2. Total Construction (CNAE 41-43);G.5 % of enterprises with a security incident;250 or more;27.64 2. Total Construction (CNAE 41-43);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;59.58 2. Total Construction (CNAE 41-43);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;56.53 2. Total Construction (CNAE 41-43);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;80.82 2. Total Construction (CNAE 41-43);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;78.87 2. Total Construction (CNAE 41-43);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;23.34 2. Total Construction (CNAE 41-43);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;22.98 2. Total Construction (CNAE 41-43);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;25.84 2. Total Construction (CNAE 41-43);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;25.59 2. Total Construction (CNAE 41-43);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;23.90 2. Total Construction (CNAE 41-43);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;24.76 2. Total Construction (CNAE 41-43);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;17.81 2. Total Construction (CNAE 41-43);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;19.23 2. Total Construction (CNAE 41-43);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;19.95 2. Total Construction (CNAE 41-43);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;19.49 2. Total Construction (CNAE 41-43);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;24.34 2. Total Construction (CNAE 41-43);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;15.14 2. Total Construction (CNAE 41-43);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;7.69 2. Total Construction (CNAE 41-43);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;6.79 2. Total Construction (CNAE 41-43);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;14.42 2. Total Construction (CNAE 41-43);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;10.45 2. Total Construction (CNAE 41-43);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;4.41 2. Total Construction (CNAE 41-43);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;3.43 2. Total Construction (CNAE 41-43);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;12.48 2. Total Construction (CNAE 41-43);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;2.72 2. Total Construction (CNAE 41-43);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;28.91 2. Total Construction (CNAE 41-43);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;27.74 2. Total Construction (CNAE 41-43);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;37.14 2. Total Construction (CNAE 41-43);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;77.33 2. Total Construction (CNAE 41-43);G.6.B % of enterprises whose ICT security is handled by external providers;Total;60.42 2. Total Construction (CNAE 41-43);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;59.67 2. Total Construction (CNAE 41-43);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;68.08 2. Total Construction (CNAE 41-43);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;65.92 2. Total Construction (CNAE 41-43);G.7 % of enterprises that have insurance against ICT security incidents;Total;13.54 2. Total Construction (CNAE 41-43);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;12.47 2. Total Construction (CNAE 41-43);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;23.74 2. Total Construction (CNAE 41-43);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;29.05 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1 % of enterprises that apply some ICT security measure;Total;90.82 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;89.97 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;93.92 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1 % of enterprises that apply some ICT security measure;250 or more;97.68 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.A % of enterprises with strong password authentication (1);Total;90.83 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;89.91 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;94.20 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.A % of enterprises with strong password authentication (1);250 or more;97.03 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.B % of enterprises with biometric authentication (1);Total;19.18 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;16.94 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;26.18 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.B % of enterprises with biometric authentication (1);250 or more;39.80 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;28.21 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;24.16 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;42.66 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;57.13 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.D % of enterprises with encryption techniques (1);Total;40.04 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;35.56 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;55.79 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.D % of enterprises with encryption techniques (1);250 or more;73.07 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.E % of enterprises with data backup in a separate location (1);Total;92.24 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;91.35 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;95.74 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.E % of enterprises with data backup in a separate location (1);250 or more;97.06 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.F % of enterprises with control of network access (1);Total;74.31 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.F % of enterprises with control of network access (1);From 10 to 49;71.36 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.F % of enterprises with control of network access (1);From 50 to 249;85.65 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.F % of enterprises with control of network access (1);250 or more;91.68 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.G % of enterprises with a Virtual Private Network (1);Total;57.48 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;52.26 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;77.16 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;89.67 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.H % of enterprises with an ICT security monitoring system;Total;45.70 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;40.83 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;63.51 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.H % of enterprises with an ICT security monitoring system;250 or more;78.26 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;43.99 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;38.93 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;62.20 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;79.29 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.J % of enterprises with an ICT risk assessment (1);Total;34.41 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;29.65 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;50.64 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;72.02 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.K % of enterprises with an ICT security test (1);Total;39.24 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;34.67 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;54.93 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.1.K % of enterprises with an ICT security test (1);250 or more;74.77 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.A % of enterprises with voluntary ICT security training;Total;46.56 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;43.03 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;59.26 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.A % of enterprises with voluntary ICT security training;250 or more;75.90 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.B % of enterprises with obligations training on ICT security;Total;23.90 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;20.62 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;35.27 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.B % of enterprises with obligations training on ICT security;250 or more;53.70 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.C % of enterprises with ICT security obligations by contract;Total;24.13 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;21.73 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;33.26 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.2.C % of enterprises with ICT security obligations by contract;250 or more;41.69 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.3 % of enterprises with ICT security documentation;Total;34.70 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.3 % of enterprises with ICT security documentation;From 10 to 49;30.99 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.3 % of enterprises with ICT security documentation;From 50 to 249;47.24 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.3 % of enterprises with ICT security documentation;250 or more;69.66 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;68.43 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;66.71 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;70.68 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;80.84 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;21.76 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;23.05 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;19.51 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;14.28 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;9.82 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;10.25 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;9.81 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;4.88 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5 % of enterprises with a security incident;Total;17.06 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5 % of enterprises with a security incident;From 10 to 49;15.38 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5 % of enterprises with a security incident;From 50 to 249;24.07 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5 % of enterprises with a security incident;250 or more;26.52 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;77.71 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;77.32 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;79.47 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;75.74 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;21.34 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;20.11 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;23.42 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;30.51 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;20.02 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;20.32 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;19.71 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;16.87 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;16.02 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;16.56 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;14.46 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;14.90 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;7.89 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;7.28 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;9.92 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;7.94 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;3.91 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;2.48 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;7.90 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;7.70 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;42.60 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;38.28 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;58.16 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;78.99 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.6.B % of enterprises whose ICT security is handled by external providers;Total;64.78 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;64.86 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;64.58 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;63.62 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.7 % of enterprises that have insurance against ICT security incidents;Total;23.97 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;21.47 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;33.06 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services and financial services);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;44.54 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1 % of enterprises that apply some ICT security measure;Total;91.39 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;90.55 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;95.68 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1 % of enterprises that apply some ICT security measure;250 or more;97.23 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.A % of enterprises with strong password authentication (1);Total;89.40 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;88.89 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;91.64 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.A % of enterprises with strong password authentication (1);250 or more;94.15 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.B % of enterprises with biometric authentication (1);Total;16.61 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;14.40 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;25.77 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.B % of enterprises with biometric authentication (1);250 or more;39.55 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;22.90 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;19.39 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;38.63 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;52.79 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.D % of enterprises with encryption techniques (1);Total;33.70 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;29.64 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;51.28 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.D % of enterprises with encryption techniques (1);250 or more;72.00 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.E % of enterprises with data backup in a separate location (1);Total;92.73 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;92.07 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;95.93 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.E % of enterprises with data backup in a separate location (1);250 or more;96.67 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.F % of enterprises with control of network access (1);Total;73.45 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.F % of enterprises with control of network access (1);From 10 to 49;70.90 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.F % of enterprises with control of network access (1);From 50 to 249;85.08 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.F % of enterprises with control of network access (1);250 or more;93.99 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.G % of enterprises with a Virtual Private Network (1);Total;54.37 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;49.29 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;78.35 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;90.28 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.H % of enterprises with an ICT security monitoring system;Total;40.38 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;36.11 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;59.54 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.H % of enterprises with an ICT security monitoring system;250 or more;76.29 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;38.56 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;33.85 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;59.98 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;76.82 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.J % of enterprises with an ICT risk assessment (1);Total;27.80 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;23.91 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;43.88 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;68.76 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.K % of enterprises with an ICT security test (1);Total;32.25 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;28.37 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;48.73 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.1.K % of enterprises with an ICT security test (1);250 or more;70.75 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.A % of enterprises with voluntary ICT security training;Total;39.17 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;35.85 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;54.19 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.A % of enterprises with voluntary ICT security training;250 or more;73.70 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.B % of enterprises with obligations training on ICT security;Total;18.90 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;16.48 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;29.29 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.B % of enterprises with obligations training on ICT security;250 or more;47.43 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.C % of enterprises with ICT security obligations by contract;Total;19.13 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;16.85 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;30.08 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.2.C % of enterprises with ICT security obligations by contract;250 or more;39.17 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.3 % of enterprises with ICT security documentation;Total;26.96 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.3 % of enterprises with ICT security documentation;From 10 to 49;23.71 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.3 % of enterprises with ICT security documentation;From 50 to 249;41.19 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.3 % of enterprises with ICT security documentation;250 or more;63.71 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;65.52 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;64.72 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;66.04 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;74.83 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;23.93 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;24.80 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;22.44 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;17.46 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;10.55 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;10.48 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;11.52 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;7.71 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5 % of enterprises with a security incident;Total;15.02 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5 % of enterprises with a security incident;From 10 to 49;12.83 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5 % of enterprises with a security incident;From 50 to 249;27.07 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5 % of enterprises with a security incident;250 or more;24.84 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;76.42 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;76.46 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;75.90 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;79.03 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;22.60 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;22.77 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;21.94 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;23.64 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;16.18 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;15.48 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;18.33 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;15.80 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;19.03 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;20.15 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;16.54 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;13.58 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;6.47 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;5.21 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;9.77 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;9.37 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;3.24 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;0.66 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;10.29 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;7.06 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;37.36 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;33.24 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;55.47 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;83.38 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.6.B % of enterprises whose ICT security is handled by external providers;Total;70.50 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;70.55 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;70.92 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;65.89 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.7 % of enterprises that have insurance against ICT security incidents;Total;19.90 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;17.88 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;30.05 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;35.04 3.2. Transport and storage (CNAE 49-53);G.1 % of enterprises that apply some ICT security measure;Total;87.79 3.2. Transport and storage (CNAE 49-53);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;87.04 3.2. Transport and storage (CNAE 49-53);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;90.11 3.2. Transport and storage (CNAE 49-53);G.1 % of enterprises that apply some ICT security measure;250 or more;97.54 3.2. Transport and storage (CNAE 49-53);G.1.A % of enterprises with strong password authentication (1);Total;90.14 3.2. Transport and storage (CNAE 49-53);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;88.71 3.2. Transport and storage (CNAE 49-53);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;96.29 3.2. Transport and storage (CNAE 49-53);G.1.A % of enterprises with strong password authentication (1);250 or more;98.02 3.2. Transport and storage (CNAE 49-53);G.1.B % of enterprises with biometric authentication (1);Total;16.24 3.2. Transport and storage (CNAE 49-53);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;14.72 3.2. Transport and storage (CNAE 49-53);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;19.57 3.2. Transport and storage (CNAE 49-53);G.1.B % of enterprises with biometric authentication (1);250 or more;39.30 3.2. Transport and storage (CNAE 49-53);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;23.12 3.2. Transport and storage (CNAE 49-53);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;20.03 3.2. Transport and storage (CNAE 49-53);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;32.35 3.2. Transport and storage (CNAE 49-53);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;58.92 3.2. Transport and storage (CNAE 49-53);G.1.D % of enterprises with encryption techniques (1);Total;30.07 3.2. Transport and storage (CNAE 49-53);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;26.20 3.2. Transport and storage (CNAE 49-53);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;42.39 3.2. Transport and storage (CNAE 49-53);G.1.D % of enterprises with encryption techniques (1);250 or more;71.34 3.2. Transport and storage (CNAE 49-53);G.1.E % of enterprises with data backup in a separate location (1);Total;88.47 3.2. Transport and storage (CNAE 49-53);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;87.24 3.2. Transport and storage (CNAE 49-53);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;93.55 3.2. Transport and storage (CNAE 49-53);G.1.E % of enterprises with data backup in a separate location (1);250 or more;96.38 3.2. Transport and storage (CNAE 49-53);G.1.F % of enterprises with control of network access (1);Total;63.55 3.2. Transport and storage (CNAE 49-53);G.1.F % of enterprises with control of network access (1);From 10 to 49;58.89 3.2. Transport and storage (CNAE 49-53);G.1.F % of enterprises with control of network access (1);From 50 to 249;82.61 3.2. Transport and storage (CNAE 49-53);G.1.F % of enterprises with control of network access (1);250 or more;93.45 3.2. Transport and storage (CNAE 49-53);G.1.G % of enterprises with a Virtual Private Network (1);Total;49.54 3.2. Transport and storage (CNAE 49-53);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;43.94 3.2. Transport and storage (CNAE 49-53);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;71.39 3.2. Transport and storage (CNAE 49-53);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;90.35 3.2. Transport and storage (CNAE 49-53);G.1.H % of enterprises with an ICT security monitoring system;Total;37.91 3.2. Transport and storage (CNAE 49-53);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;32.68 3.2. Transport and storage (CNAE 49-53);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;57.21 3.2. Transport and storage (CNAE 49-53);G.1.H % of enterprises with an ICT security monitoring system;250 or more;81.18 3.2. Transport and storage (CNAE 49-53);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;33.68 3.2. Transport and storage (CNAE 49-53);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;27.61 3.2. Transport and storage (CNAE 49-53);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;55.79 3.2. Transport and storage (CNAE 49-53);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;85.11 3.2. Transport and storage (CNAE 49-53);G.1.J % of enterprises with an ICT risk assessment (1);Total;25.80 3.2. Transport and storage (CNAE 49-53);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;21.86 3.2. Transport and storage (CNAE 49-53);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;38.00 3.2. Transport and storage (CNAE 49-53);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;69.35 3.2. Transport and storage (CNAE 49-53);G.1.K % of enterprises with an ICT security test (1);Total;33.17 3.2. Transport and storage (CNAE 49-53);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;27.74 3.2. Transport and storage (CNAE 49-53);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;53.31 3.2. Transport and storage (CNAE 49-53);G.1.K % of enterprises with an ICT security test (1);250 or more;77.63 3.2. Transport and storage (CNAE 49-53);G.2.A % of enterprises with voluntary ICT security training;Total;40.65 3.2. Transport and storage (CNAE 49-53);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;38.40 3.2. Transport and storage (CNAE 49-53);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;47.16 3.2. Transport and storage (CNAE 49-53);G.2.A % of enterprises with voluntary ICT security training;250 or more;72.16 3.2. Transport and storage (CNAE 49-53);G.2.B % of enterprises with obligations training on ICT security;Total;17.54 3.2. Transport and storage (CNAE 49-53);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;15.35 3.2. Transport and storage (CNAE 49-53);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;23.53 3.2. Transport and storage (CNAE 49-53);G.2.B % of enterprises with obligations training on ICT security;250 or more;50.04 3.2. Transport and storage (CNAE 49-53);G.2.C % of enterprises with ICT security obligations by contract;Total;19.24 3.2. Transport and storage (CNAE 49-53);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;17.81 3.2. Transport and storage (CNAE 49-53);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;24.43 3.2. Transport and storage (CNAE 49-53);G.2.C % of enterprises with ICT security obligations by contract;250 or more;33.71 3.2. Transport and storage (CNAE 49-53);G.3 % of enterprises with ICT security documentation;Total;27.54 3.2. Transport and storage (CNAE 49-53);G.3 % of enterprises with ICT security documentation;From 10 to 49;24.35 3.2. Transport and storage (CNAE 49-53);G.3 % of enterprises with ICT security documentation;From 50 to 249;37.40 3.2. Transport and storage (CNAE 49-53);G.3 % of enterprises with ICT security documentation;250 or more;68.92 3.2. Transport and storage (CNAE 49-53);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;67.12 3.2. Transport and storage (CNAE 49-53);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;67.32 3.2. Transport and storage (CNAE 49-53);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;64.58 3.2. Transport and storage (CNAE 49-53);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;72.03 3.2. Transport and storage (CNAE 49-53);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;23.29 3.2. Transport and storage (CNAE 49-53);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;23.64 3.2. Transport and storage (CNAE 49-53);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;23.39 3.2. Transport and storage (CNAE 49-53);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;19.55 3.2. Transport and storage (CNAE 49-53);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;9.59 3.2. Transport and storage (CNAE 49-53);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;9.04 3.2. Transport and storage (CNAE 49-53);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;12.03 3.2. Transport and storage (CNAE 49-53);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;8.42 3.2. Transport and storage (CNAE 49-53);G.5 % of enterprises with a security incident;Total;12.85 3.2. Transport and storage (CNAE 49-53);G.5 % of enterprises with a security incident;From 10 to 49;11.60 3.2. Transport and storage (CNAE 49-53);G.5 % of enterprises with a security incident;From 50 to 249;16.30 3.2. Transport and storage (CNAE 49-53);G.5 % of enterprises with a security incident;250 or more;31.09 3.2. Transport and storage (CNAE 49-53);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;77.93 3.2. Transport and storage (CNAE 49-53);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;78.51 3.2. Transport and storage (CNAE 49-53);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;79.10 3.2. Transport and storage (CNAE 49-53);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;68.68 3.2. Transport and storage (CNAE 49-53);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;23.84 3.2. Transport and storage (CNAE 49-53);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;22.57 3.2. Transport and storage (CNAE 49-53);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;24.69 3.2. Transport and storage (CNAE 49-53);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;35.12 3.2. Transport and storage (CNAE 49-53);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;30.63 3.2. Transport and storage (CNAE 49-53);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;36.22 3.2. Transport and storage (CNAE 49-53);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;9.87 3.2. Transport and storage (CNAE 49-53);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;26.14 3.2. Transport and storage (CNAE 49-53);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;16.14 3.2. Transport and storage (CNAE 49-53);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;15.74 3.2. Transport and storage (CNAE 49-53);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;15.30 3.2. Transport and storage (CNAE 49-53);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;22.68 3.2. Transport and storage (CNAE 49-53);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;7.09 3.2. Transport and storage (CNAE 49-53);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;6.37 3.2. Transport and storage (CNAE 49-53);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;10.81 3.2. Transport and storage (CNAE 49-53);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;4.84 3.2. Transport and storage (CNAE 49-53);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;0.63 3.2. Transport and storage (CNAE 49-53);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;0.00 3.2. Transport and storage (CNAE 49-53);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;2.06 3.2. Transport and storage (CNAE 49-53);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;3.63 3.2. Transport and storage (CNAE 49-53);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;35.30 3.2. Transport and storage (CNAE 49-53);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;31.67 3.2. Transport and storage (CNAE 49-53);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;46.51 3.2. Transport and storage (CNAE 49-53);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;82.51 3.2. Transport and storage (CNAE 49-53);G.6.B % of enterprises whose ICT security is handled by external providers;Total;64.34 3.2. Transport and storage (CNAE 49-53);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;63.72 3.2. Transport and storage (CNAE 49-53);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;66.83 3.2. Transport and storage (CNAE 49-53);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;69.62 3.2. Transport and storage (CNAE 49-53);G.7 % of enterprises that have insurance against ICT security incidents;Total;19.32 3.2. Transport and storage (CNAE 49-53);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;17.85 3.2. Transport and storage (CNAE 49-53);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;23.41 3.2. Transport and storage (CNAE 49-53);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;40.73 3.3. Accommodation services (CNAE 55);G.1 % of enterprises that apply some ICT security measure;Total;95.95 3.3. Accommodation services (CNAE 55);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;94.96 3.3. Accommodation services (CNAE 55);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;99.51 3.3. Accommodation services (CNAE 55);G.1 % of enterprises that apply some ICT security measure;250 or more;98.90 3.3. Accommodation services (CNAE 55);G.1.A % of enterprises with strong password authentication (1);Total;93.63 3.3. Accommodation services (CNAE 55);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;92.80 3.3. Accommodation services (CNAE 55);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;96.26 3.3. Accommodation services (CNAE 55);G.1.A % of enterprises with strong password authentication (1);250 or more;97.61 3.3. Accommodation services (CNAE 55);G.1.B % of enterprises with biometric authentication (1);Total;23.91 3.3. Accommodation services (CNAE 55);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;19.01 3.3. Accommodation services (CNAE 55);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;39.32 3.3. Accommodation services (CNAE 55);G.1.B % of enterprises with biometric authentication (1);250 or more;47.87 3.3. Accommodation services (CNAE 55);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;23.37 3.3. Accommodation services (CNAE 55);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;17.79 3.3. Accommodation services (CNAE 55);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;41.07 3.3. Accommodation services (CNAE 55);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;49.51 3.3. Accommodation services (CNAE 55);G.1.D % of enterprises with encryption techniques (1);Total;38.37 3.3. Accommodation services (CNAE 55);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;32.40 3.3. Accommodation services (CNAE 55);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;57.70 3.3. Accommodation services (CNAE 55);G.1.D % of enterprises with encryption techniques (1);250 or more;64.07 3.3. Accommodation services (CNAE 55);G.1.E % of enterprises with data backup in a separate location (1);Total;91.02 3.3. Accommodation services (CNAE 55);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;89.89 3.3. Accommodation services (CNAE 55);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;94.12 3.3. Accommodation services (CNAE 55);G.1.E % of enterprises with data backup in a separate location (1);250 or more;100.00 3.3. Accommodation services (CNAE 55);G.1.F % of enterprises with control of network access (1);Total;74.24 3.3. Accommodation services (CNAE 55);G.1.F % of enterprises with control of network access (1);From 10 to 49;69.95 3.3. Accommodation services (CNAE 55);G.1.F % of enterprises with control of network access (1);From 50 to 249;88.11 3.3. Accommodation services (CNAE 55);G.1.F % of enterprises with control of network access (1);250 or more;92.73 3.3. Accommodation services (CNAE 55);G.1.G % of enterprises with a Virtual Private Network (1);Total;53.06 3.3. Accommodation services (CNAE 55);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;42.79 3.3. Accommodation services (CNAE 55);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;86.48 3.3. Accommodation services (CNAE 55);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;95.51 3.3. Accommodation services (CNAE 55);G.1.H % of enterprises with an ICT security monitoring system;Total;44.72 3.3. Accommodation services (CNAE 55);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;37.75 3.3. Accommodation services (CNAE 55);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;66.36 3.3. Accommodation services (CNAE 55);G.1.H % of enterprises with an ICT security monitoring system;250 or more;80.75 3.3. Accommodation services (CNAE 55);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;42.79 3.3. Accommodation services (CNAE 55);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;35.18 3.3. Accommodation services (CNAE 55);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;65.81 3.3. Accommodation services (CNAE 55);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;86.61 3.3. Accommodation services (CNAE 55);G.1.J % of enterprises with an ICT risk assessment (1);Total;31.20 3.3. Accommodation services (CNAE 55);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;25.12 3.3. Accommodation services (CNAE 55);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;48.60 3.3. Accommodation services (CNAE 55);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;73.07 3.3. Accommodation services (CNAE 55);G.1.K % of enterprises with an ICT security test (1);Total;34.42 3.3. Accommodation services (CNAE 55);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;27.31 3.3. Accommodation services (CNAE 55);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;56.47 3.3. Accommodation services (CNAE 55);G.1.K % of enterprises with an ICT security test (1);250 or more;71.55 3.3. Accommodation services (CNAE 55);G.2.A % of enterprises with voluntary ICT security training;Total;50.12 3.3. Accommodation services (CNAE 55);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;47.46 3.3. Accommodation services (CNAE 55);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;58.13 3.3. Accommodation services (CNAE 55);G.2.A % of enterprises with voluntary ICT security training;250 or more;69.09 3.3. Accommodation services (CNAE 55);G.2.B % of enterprises with obligations training on ICT security;Total;21.70 3.3. Accommodation services (CNAE 55);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;18.17 3.3. Accommodation services (CNAE 55);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;32.66 3.3. Accommodation services (CNAE 55);G.2.B % of enterprises with obligations training on ICT security;250 or more;44.20 3.3. Accommodation services (CNAE 55);G.2.C % of enterprises with ICT security obligations by contract;Total;24.88 3.3. Accommodation services (CNAE 55);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;21.68 3.3. Accommodation services (CNAE 55);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;35.07 3.3. Accommodation services (CNAE 55);G.2.C % of enterprises with ICT security obligations by contract;250 or more;43.51 3.3. Accommodation services (CNAE 55);G.3 % of enterprises with ICT security documentation;Total;29.37 3.3. Accommodation services (CNAE 55);G.3 % of enterprises with ICT security documentation;From 10 to 49;24.93 3.3. Accommodation services (CNAE 55);G.3 % of enterprises with ICT security documentation;From 50 to 249;42.64 3.3. Accommodation services (CNAE 55);G.3 % of enterprises with ICT security documentation;250 or more;61.39 3.3. Accommodation services (CNAE 55);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;57.28 3.3. Accommodation services (CNAE 55);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;54.31 3.3. Accommodation services (CNAE 55);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;61.27 3.3. Accommodation services (CNAE 55);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;71.88 3.3. Accommodation services (CNAE 55);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;28.19 3.3. Accommodation services (CNAE 55);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;28.85 3.3. Accommodation services (CNAE 55);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;27.41 3.3. Accommodation services (CNAE 55);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;24.50 3.3. Accommodation services (CNAE 55);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;14.52 3.3. Accommodation services (CNAE 55);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;16.84 3.3. Accommodation services (CNAE 55);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;11.31 3.3. Accommodation services (CNAE 55);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;3.62 3.3. Accommodation services (CNAE 55);G.5 % of enterprises with a security incident;Total;19.87 3.3. Accommodation services (CNAE 55);G.5 % of enterprises with a security incident;From 10 to 49;17.58 3.3. Accommodation services (CNAE 55);G.5 % of enterprises with a security incident;From 50 to 249;28.01 3.3. Accommodation services (CNAE 55);G.5 % of enterprises with a security incident;250 or more;27.29 3.3. Accommodation services (CNAE 55);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;80.65 3.3. Accommodation services (CNAE 55);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;85.33 3.3. Accommodation services (CNAE 55);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;70.00 3.3. Accommodation services (CNAE 55);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;72.10 3.3. Accommodation services (CNAE 55);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;21.74 3.3. Accommodation services (CNAE 55);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;18.78 3.3. Accommodation services (CNAE 55);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;28.37 3.3. Accommodation services (CNAE 55);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;27.90 3.3. Accommodation services (CNAE 55);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;25.80 3.3. Accommodation services (CNAE 55);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;23.78 3.3. Accommodation services (CNAE 55);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;32.12 3.3. Accommodation services (CNAE 55);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;17.25 3.3. Accommodation services (CNAE 55);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;14.03 3.3. Accommodation services (CNAE 55);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;11.95 3.3. Accommodation services (CNAE 55);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;18.99 3.3. Accommodation services (CNAE 55);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;16.34 3.3. Accommodation services (CNAE 55);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;7.01 3.3. Accommodation services (CNAE 55);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;4.16 3.3. Accommodation services (CNAE 55);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;13.59 3.3. Accommodation services (CNAE 55);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;11.57 3.3. Accommodation services (CNAE 55);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;6.45 3.3. Accommodation services (CNAE 55);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;4.16 3.3. Accommodation services (CNAE 55);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;11.53 3.3. Accommodation services (CNAE 55);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;11.57 3.3. Accommodation services (CNAE 55);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;33.63 3.3. Accommodation services (CNAE 55);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;26.07 3.3. Accommodation services (CNAE 55);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;56.32 3.3. Accommodation services (CNAE 55);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;88.03 3.3. Accommodation services (CNAE 55);G.6.B % of enterprises whose ICT security is handled by external providers;Total;75.69 3.3. Accommodation services (CNAE 55);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;76.25 3.3. Accommodation services (CNAE 55);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;74.51 3.3. Accommodation services (CNAE 55);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;68.06 3.3. Accommodation services (CNAE 55);G.7 % of enterprises that have insurance against ICT security incidents;Total;26.11 3.3. Accommodation services (CNAE 55);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;23.63 3.3. Accommodation services (CNAE 55);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;33.10 3.3. Accommodation services (CNAE 55);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;47.03 3.4. Information and communications (CNAE 58-63);G.1 % of enterprises that apply some ICT security measure;Total;96.09 3.4. Information and communications (CNAE 58-63);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;95.20 3.4. Information and communications (CNAE 58-63);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;98.74 3.4. Information and communications (CNAE 58-63);G.1 % of enterprises that apply some ICT security measure;250 or more;99.64 3.4. Information and communications (CNAE 58-63);G.1.A % of enterprises with strong password authentication (1);Total;97.58 3.4. Information and communications (CNAE 58-63);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;97.40 3.4. Information and communications (CNAE 58-63);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;97.98 3.4. Information and communications (CNAE 58-63);G.1.A % of enterprises with strong password authentication (1);250 or more;98.68 3.4. Information and communications (CNAE 58-63);G.1.B % of enterprises with biometric authentication (1);Total;32.88 3.4. Information and communications (CNAE 58-63);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;31.09 3.4. Information and communications (CNAE 58-63);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;35.69 3.4. Information and communications (CNAE 58-63);G.1.B % of enterprises with biometric authentication (1);250 or more;49.14 3.4. Information and communications (CNAE 58-63);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;54.53 3.4. Information and communications (CNAE 58-63);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;50.42 3.4. Information and communications (CNAE 58-63);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;63.82 3.4. Information and communications (CNAE 58-63);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;80.29 3.4. Information and communications (CNAE 58-63);G.1.D % of enterprises with encryption techniques (1);Total;68.65 3.4. Information and communications (CNAE 58-63);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;64.22 3.4. Information and communications (CNAE 58-63);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;80.26 3.4. Information and communications (CNAE 58-63);G.1.D % of enterprises with encryption techniques (1);250 or more;90.11 3.4. Information and communications (CNAE 58-63);G.1.E % of enterprises with data backup in a separate location (1);Total;97.30 3.4. Information and communications (CNAE 58-63);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;97.19 3.4. Information and communications (CNAE 58-63);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;97.22 3.4. Information and communications (CNAE 58-63);G.1.E % of enterprises with data backup in a separate location (1);250 or more;99.28 3.4. Information and communications (CNAE 58-63);G.1.F % of enterprises with control of network access (1);Total;87.66 3.4. Information and communications (CNAE 58-63);G.1.F % of enterprises with control of network access (1);From 10 to 49;85.97 3.4. Information and communications (CNAE 58-63);G.1.F % of enterprises with control of network access (1);From 50 to 249;91.92 3.4. Information and communications (CNAE 58-63);G.1.F % of enterprises with control of network access (1);250 or more;96.44 3.4. Information and communications (CNAE 58-63);G.1.G % of enterprises with a Virtual Private Network (1);Total;77.73 3.4. Information and communications (CNAE 58-63);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;72.18 3.4. Information and communications (CNAE 58-63);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;94.39 3.4. Information and communications (CNAE 58-63);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;96.36 3.4. Information and communications (CNAE 58-63);G.1.H % of enterprises with an ICT security monitoring system;Total;73.31 3.4. Information and communications (CNAE 58-63);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;70.11 3.4. Information and communications (CNAE 58-63);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;80.65 3.4. Information and communications (CNAE 58-63);G.1.H % of enterprises with an ICT security monitoring system;250 or more;92.99 3.4. Information and communications (CNAE 58-63);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;75.87 3.4. Information and communications (CNAE 58-63);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;72.00 3.4. Information and communications (CNAE 58-63);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;86.24 3.4. Information and communications (CNAE 58-63);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;93.70 3.4. Information and communications (CNAE 58-63);G.1.J % of enterprises with an ICT risk assessment (1);Total;65.64 3.4. Information and communications (CNAE 58-63);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;61.23 3.4. Information and communications (CNAE 58-63);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;76.16 3.4. Information and communications (CNAE 58-63);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;91.31 3.4. Information and communications (CNAE 58-63);G.1.K % of enterprises with an ICT security test (1);Total;67.20 3.4. Information and communications (CNAE 58-63);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;63.71 3.4. Information and communications (CNAE 58-63);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;74.29 3.4. Information and communications (CNAE 58-63);G.1.K % of enterprises with an ICT security test (1);250 or more;92.29 3.4. Information and communications (CNAE 58-63);G.2.A % of enterprises with voluntary ICT security training;Total;77.96 3.4. Information and communications (CNAE 58-63);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;75.72 3.4. Information and communications (CNAE 58-63);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;83.25 3.4. Information and communications (CNAE 58-63);G.2.A % of enterprises with voluntary ICT security training;250 or more;92.50 3.4. Information and communications (CNAE 58-63);G.2.B % of enterprises with obligations training on ICT security;Total;48.10 3.4. Information and communications (CNAE 58-63);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;42.39 3.4. Information and communications (CNAE 58-63);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;62.14 3.4. Information and communications (CNAE 58-63);G.2.B % of enterprises with obligations training on ICT security;250 or more;83.01 3.4. Information and communications (CNAE 58-63);G.2.C % of enterprises with ICT security obligations by contract;Total;48.05 3.4. Information and communications (CNAE 58-63);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;45.29 3.4. Information and communications (CNAE 58-63);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;56.17 3.4. Information and communications (CNAE 58-63);G.2.C % of enterprises with ICT security obligations by contract;250 or more;59.77 3.4. Information and communications (CNAE 58-63);G.3 % of enterprises with ICT security documentation;Total;66.90 3.4. Information and communications (CNAE 58-63);G.3 % of enterprises with ICT security documentation;From 10 to 49;62.75 3.4. Information and communications (CNAE 58-63);G.3 % of enterprises with ICT security documentation;From 50 to 249;78.02 3.4. Information and communications (CNAE 58-63);G.3 % of enterprises with ICT security documentation;250 or more;88.58 3.4. Information and communications (CNAE 58-63);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;78.47 3.4. Information and communications (CNAE 58-63);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;75.70 3.4. Information and communications (CNAE 58-63);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;83.48 3.4. Information and communications (CNAE 58-63);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;92.11 3.4. Information and communications (CNAE 58-63);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;15.65 3.4. Information and communications (CNAE 58-63);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;17.65 3.4. Information and communications (CNAE 58-63);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;12.05 3.4. Information and communications (CNAE 58-63);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;5.81 3.4. Information and communications (CNAE 58-63);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;5.88 3.4. Information and communications (CNAE 58-63);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;6.66 3.4. Information and communications (CNAE 58-63);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;4.47 3.4. Information and communications (CNAE 58-63);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;2.09 3.4. Information and communications (CNAE 58-63);G.5 % of enterprises with a security incident;Total;22.97 3.4. Information and communications (CNAE 58-63);G.5 % of enterprises with a security incident;From 10 to 49;21.64 3.4. Information and communications (CNAE 58-63);G.5 % of enterprises with a security incident;From 50 to 249;27.45 3.4. Information and communications (CNAE 58-63);G.5 % of enterprises with a security incident;250 or more;26.22 3.4. Information and communications (CNAE 58-63);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;80.19 3.4. Information and communications (CNAE 58-63);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;79.22 3.4. Information and communications (CNAE 58-63);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;85.04 3.4. Information and communications (CNAE 58-63);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;72.73 3.4. Information and communications (CNAE 58-63);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;19.70 3.4. Information and communications (CNAE 58-63);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;19.04 3.4. Information and communications (CNAE 58-63);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;19.71 3.4. Information and communications (CNAE 58-63);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;28.34 3.4. Information and communications (CNAE 58-63);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;20.85 3.4. Information and communications (CNAE 58-63);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;21.45 3.4. Information and communications (CNAE 58-63);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;18.73 3.4. Information and communications (CNAE 58-63);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;21.75 3.4. Information and communications (CNAE 58-63);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;10.23 3.4. Information and communications (CNAE 58-63);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;10.04 3.4. Information and communications (CNAE 58-63);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;8.84 3.4. Information and communications (CNAE 58-63);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;18.45 3.4. Information and communications (CNAE 58-63);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;8.27 3.4. Information and communications (CNAE 58-63);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;7.69 3.4. Information and communications (CNAE 58-63);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;10.57 3.4. Information and communications (CNAE 58-63);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;6.27 3.4. Information and communications (CNAE 58-63);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;6.23 3.4. Information and communications (CNAE 58-63);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;5.09 3.4. Information and communications (CNAE 58-63);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;9.58 3.4. Information and communications (CNAE 58-63);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;7.30 3.4. Information and communications (CNAE 58-63);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;79.83 3.4. Information and communications (CNAE 58-63);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;76.54 3.4. Information and communications (CNAE 58-63);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;89.51 3.4. Information and communications (CNAE 58-63);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;93.53 3.4. Information and communications (CNAE 58-63);G.6.B % of enterprises whose ICT security is handled by external providers;Total;38.91 3.4. Information and communications (CNAE 58-63);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;38.31 3.4. Information and communications (CNAE 58-63);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;39.89 3.4. Information and communications (CNAE 58-63);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;44.60 3.4. Information and communications (CNAE 58-63);G.7 % of enterprises that have insurance against ICT security incidents;Total;42.52 3.4. Information and communications (CNAE 58-63);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;38.35 3.4. Information and communications (CNAE 58-63);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;52.63 3.4. Information and communications (CNAE 58-63);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;68.52 3.5. Real estate activities (CNAE 68);G.1 % of enterprises that apply some ICT security measure;Total;95.63 3.5. Real estate activities (CNAE 68);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;95.68 3.5. Real estate activities (CNAE 68);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;94.46 3.5. Real estate activities (CNAE 68);G.1 % of enterprises that apply some ICT security measure;250 or more;100.00 3.5. Real estate activities (CNAE 68);G.1.A % of enterprises with strong password authentication (1);Total;87.94 3.5. Real estate activities (CNAE 68);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;86.67 3.5. Real estate activities (CNAE 68);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;100.00 3.5. Real estate activities (CNAE 68);G.1.A % of enterprises with strong password authentication (1);250 or more;100.00 3.5. Real estate activities (CNAE 68);G.1.B % of enterprises with biometric authentication (1);Total;18.18 3.5. Real estate activities (CNAE 68);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;17.27 3.5. Real estate activities (CNAE 68);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;24.97 3.5. Real estate activities (CNAE 68);G.1.B % of enterprises with biometric authentication (1);250 or more;37.50 3.5. Real estate activities (CNAE 68);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;27.80 3.5. Real estate activities (CNAE 68);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;23.07 3.5. Real estate activities (CNAE 68);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;69.12 3.5. Real estate activities (CNAE 68);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;93.75 3.5. Real estate activities (CNAE 68);G.1.D % of enterprises with encryption techniques (1);Total;36.89 3.5. Real estate activities (CNAE 68);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;34.09 3.5. Real estate activities (CNAE 68);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;58.13 3.5. Real estate activities (CNAE 68);G.1.D % of enterprises with encryption techniques (1);250 or more;93.75 3.5. Real estate activities (CNAE 68);G.1.E % of enterprises with data backup in a separate location (1);Total;91.31 3.5. Real estate activities (CNAE 68);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;90.49 3.5. Real estate activities (CNAE 68);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;100.00 3.5. Real estate activities (CNAE 68);G.1.E % of enterprises with data backup in a separate location (1);250 or more;93.75 3.5. Real estate activities (CNAE 68);G.1.F % of enterprises with control of network access (1);Total;71.66 3.5. Real estate activities (CNAE 68);G.1.F % of enterprises with control of network access (1);From 10 to 49;68.87 3.5. Real estate activities (CNAE 68);G.1.F % of enterprises with control of network access (1);From 50 to 249;100.00 3.5. Real estate activities (CNAE 68);G.1.F % of enterprises with control of network access (1);250 or more;87.50 3.5. Real estate activities (CNAE 68);G.1.G % of enterprises with a Virtual Private Network (1);Total;53.90 3.5. Real estate activities (CNAE 68);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;49.52 3.5. Real estate activities (CNAE 68);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;95.80 3.5. Real estate activities (CNAE 68);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;93.75 3.5. Real estate activities (CNAE 68);G.1.H % of enterprises with an ICT security monitoring system;Total;44.70 3.5. Real estate activities (CNAE 68);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;40.03 3.5. Real estate activities (CNAE 68);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;89.27 3.5. Real estate activities (CNAE 68);G.1.H % of enterprises with an ICT security monitoring system;250 or more;87.50 3.5. Real estate activities (CNAE 68);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;45.86 3.5. Real estate activities (CNAE 68);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;40.65 3.5. Real estate activities (CNAE 68);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;95.66 3.5. Real estate activities (CNAE 68);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;93.75 3.5. Real estate activities (CNAE 68);G.1.J % of enterprises with an ICT risk assessment (1);Total;34.98 3.5. Real estate activities (CNAE 68);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;31.46 3.5. Real estate activities (CNAE 68);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;66.22 3.5. Real estate activities (CNAE 68);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;81.25 3.5. Real estate activities (CNAE 68);G.1.K % of enterprises with an ICT security test (1);Total;41.31 3.5. Real estate activities (CNAE 68);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;37.66 3.5. Real estate activities (CNAE 68);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;73.94 3.5. Real estate activities (CNAE 68);G.1.K % of enterprises with an ICT security test (1);250 or more;87.50 3.5. Real estate activities (CNAE 68);G.2.A % of enterprises with voluntary ICT security training;Total;52.01 3.5. Real estate activities (CNAE 68);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;48.46 3.5. Real estate activities (CNAE 68);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;84.25 3.5. Real estate activities (CNAE 68);G.2.A % of enterprises with voluntary ICT security training;250 or more;93.75 3.5. Real estate activities (CNAE 68);G.2.B % of enterprises with obligations training on ICT security;Total;24.24 3.5. Real estate activities (CNAE 68);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;21.11 3.5. Real estate activities (CNAE 68);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;49.31 3.5. Real estate activities (CNAE 68);G.2.B % of enterprises with obligations training on ICT security;250 or more;81.25 3.5. Real estate activities (CNAE 68);G.2.C % of enterprises with ICT security obligations by contract;Total;23.49 3.5. Real estate activities (CNAE 68);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;22.60 3.5. Real estate activities (CNAE 68);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;25.83 3.5. Real estate activities (CNAE 68);G.2.C % of enterprises with ICT security obligations by contract;250 or more;68.75 3.5. Real estate activities (CNAE 68);G.3 % of enterprises with ICT security documentation;Total;35.40 3.5. Real estate activities (CNAE 68);G.3 % of enterprises with ICT security documentation;From 10 to 49;32.86 3.5. Real estate activities (CNAE 68);G.3 % of enterprises with ICT security documentation;From 50 to 249;55.90 3.5. Real estate activities (CNAE 68);G.3 % of enterprises with ICT security documentation;250 or more;81.25 3.5. Real estate activities (CNAE 68);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;55.10 3.5. Real estate activities (CNAE 68);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;50.42 3.5. Real estate activities (CNAE 68);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;80.19 3.5. Real estate activities (CNAE 68);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;76.92 3.5. Real estate activities (CNAE 68);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;37.07 3.5. Real estate activities (CNAE 68);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;40.26 3.5. Real estate activities (CNAE 68);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;19.81 3.5. Real estate activities (CNAE 68);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;23.08 3.5. Real estate activities (CNAE 68);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;7.83 3.5. Real estate activities (CNAE 68);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;9.33 3.5. Real estate activities (CNAE 68);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;0.00 3.5. Real estate activities (CNAE 68);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;0.00 3.5. Real estate activities (CNAE 68);G.5 % of enterprises with a security incident;Total;25.81 3.5. Real estate activities (CNAE 68);G.5 % of enterprises with a security incident;From 10 to 49;24.62 3.5. Real estate activities (CNAE 68);G.5 % of enterprises with a security incident;From 50 to 249;41.12 3.5. Real estate activities (CNAE 68);G.5 % of enterprises with a security incident;250 or more;12.50 3.5. Real estate activities (CNAE 68);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;83.18 3.5. Real estate activities (CNAE 68);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;85.42 3.5. Real estate activities (CNAE 68);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;70.07 3.5. Real estate activities (CNAE 68);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;50.00 3.5. Real estate activities (CNAE 68);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;30.40 3.5. Real estate activities (CNAE 68);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;30.15 3.5. Real estate activities (CNAE 68);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;33.58 3.5. Real estate activities (CNAE 68);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;0.00 3.5. Real estate activities (CNAE 68);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;5.17 3.5. Real estate activities (CNAE 68);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;4.76 3.5. Real estate activities (CNAE 68);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;5.56 3.5. Real estate activities (CNAE 68);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;50.00 3.5. Real estate activities (CNAE 68);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;1.85 3.5. Real estate activities (CNAE 68);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;1.21 3.5. Real estate activities (CNAE 68);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;6.18 3.5. Real estate activities (CNAE 68);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;0.00 3.5. Real estate activities (CNAE 68);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;4.47 3.5. Real estate activities (CNAE 68);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;4.80 3.5. Real estate activities (CNAE 68);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;2.53 3.5. Real estate activities (CNAE 68);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;0.00 3.5. Real estate activities (CNAE 68);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;0.00 3.5. Real estate activities (CNAE 68);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;0.00 3.5. Real estate activities (CNAE 68);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;0.00 3.5. Real estate activities (CNAE 68);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;0.00 3.5. Real estate activities (CNAE 68);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;35.96 3.5. Real estate activities (CNAE 68);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;32.53 3.5. Real estate activities (CNAE 68);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;64.11 3.5. Real estate activities (CNAE 68);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;93.75 3.5. Real estate activities (CNAE 68);G.6.B % of enterprises whose ICT security is handled by external providers;Total;74.55 3.5. Real estate activities (CNAE 68);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;74.47 3.5. Real estate activities (CNAE 68);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;75.35 3.5. Real estate activities (CNAE 68);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;75.00 3.5. Real estate activities (CNAE 68);G.7 % of enterprises that have insurance against ICT security incidents;Total;25.78 3.5. Real estate activities (CNAE 68);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;22.32 3.5. Real estate activities (CNAE 68);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;56.82 3.5. Real estate activities (CNAE 68);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;68.75 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1 % of enterprises that apply some ICT security measure;Total;97.18 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;97.23 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;96.40 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1 % of enterprises that apply some ICT security measure;250 or more;99.70 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.A % of enterprises with strong password authentication (1);Total;93.23 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;92.14 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;98.32 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.A % of enterprises with strong password authentication (1);250 or more;99.27 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.B % of enterprises with biometric authentication (1);Total;18.85 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;16.24 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;29.46 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.B % of enterprises with biometric authentication (1);250 or more;40.65 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;33.72 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;27.95 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;60.53 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;66.02 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.D % of enterprises with encryption techniques (1);Total;52.07 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;46.56 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;77.02 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.D % of enterprises with encryption techniques (1);250 or more;85.96 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.E % of enterprises with data backup in a separate location (1);Total;94.70 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;93.97 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;98.39 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.E % of enterprises with data backup in a separate location (1);250 or more;97.39 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.F % of enterprises with control of network access (1);Total;85.57 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.F % of enterprises with control of network access (1);From 10 to 49;83.29 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.F % of enterprises with control of network access (1);From 50 to 249;97.01 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.F % of enterprises with control of network access (1);250 or more;94.34 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.G % of enterprises with a Virtual Private Network (1);Total;72.84 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;69.27 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;88.45 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;97.54 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.H % of enterprises with an ICT security monitoring system;Total;55.08 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;49.23 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;82.02 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.H % of enterprises with an ICT security monitoring system;250 or more;88.92 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;56.51 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;51.62 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;77.39 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;92.85 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.J % of enterprises with an ICT risk assessment (1);Total;45.98 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;39.82 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;73.45 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;85.78 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.K % of enterprises with an ICT security test (1);Total;49.72 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;44.73 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;71.09 3.6. Professional, scientific and technical activities (CNAE 69-75);G.1.K % of enterprises with an ICT security test (1);250 or more;86.28 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.A % of enterprises with voluntary ICT security training;Total;62.11 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;57.90 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;81.36 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.A % of enterprises with voluntary ICT security training;250 or more;87.00 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.B % of enterprises with obligations training on ICT security;Total;33.60 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;28.67 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;55.24 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.B % of enterprises with obligations training on ICT security;250 or more;67.23 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.C % of enterprises with ICT security obligations by contract;Total;32.48 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;29.97 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;43.64 3.6. Professional, scientific and technical activities (CNAE 69-75);G.2.C % of enterprises with ICT security obligations by contract;250 or more;49.07 3.6. Professional, scientific and technical activities (CNAE 69-75);G.3 % of enterprises with ICT security documentation;Total;50.89 3.6. Professional, scientific and technical activities (CNAE 69-75);G.3 % of enterprises with ICT security documentation;From 10 to 49;46.67 3.6. Professional, scientific and technical activities (CNAE 69-75);G.3 % of enterprises with ICT security documentation;From 50 to 249;68.09 3.6. Professional, scientific and technical activities (CNAE 69-75);G.3 % of enterprises with ICT security documentation;250 or more;86.44 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;64.34 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;61.65 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;69.25 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;86.65 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;24.37 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;26.88 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;18.00 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;10.45 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;11.29 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;11.47 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;12.75 3.6. Professional, scientific and technical activities (CNAE 69-75);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;2.89 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5 % of enterprises with a security incident;Total;21.16 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5 % of enterprises with a security incident;From 10 to 49;20.02 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5 % of enterprises with a security incident;From 50 to 249;25.07 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5 % of enterprises with a security incident;250 or more;34.21 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;80.68 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;79.98 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;85.00 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;76.66 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;15.25 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;13.68 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;16.64 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;36.51 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;16.78 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;16.07 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;19.41 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;19.11 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;13.65 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;14.85 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;8.34 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;13.01 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;9.60 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;9.54 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;9.21 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;11.91 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;4.70 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;4.46 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;3.62 3.6. Professional, scientific and technical activities (CNAE 69-75);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;12.60 3.6. Professional, scientific and technical activities (CNAE 69-75);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;50.99 3.6. Professional, scientific and technical activities (CNAE 69-75);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;44.89 3.6. Professional, scientific and technical activities (CNAE 69-75);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;78.83 3.6. Professional, scientific and technical activities (CNAE 69-75);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;87.30 3.6. Professional, scientific and technical activities (CNAE 69-75);G.6.B % of enterprises whose ICT security is handled by external providers;Total;68.98 3.6. Professional, scientific and technical activities (CNAE 69-75);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;70.19 3.6. Professional, scientific and technical activities (CNAE 69-75);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;62.68 3.6. Professional, scientific and technical activities (CNAE 69-75);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;65.63 3.6. Professional, scientific and technical activities (CNAE 69-75);G.7 % of enterprises that have insurance against ICT security incidents;Total;32.00 3.6. Professional, scientific and technical activities (CNAE 69-75);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;29.34 3.6. Professional, scientific and technical activities (CNAE 69-75);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;42.23 3.6. Professional, scientific and technical activities (CNAE 69-75);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;57.50 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1 % of enterprises that apply some ICT security measure;Total;80.22 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;77.40 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;86.95 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1 % of enterprises that apply some ICT security measure;250 or more;95.84 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.A % of enterprises with strong password authentication (1);Total;87.50 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;85.67 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;90.89 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.A % of enterprises with strong password authentication (1);250 or more;97.31 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.B % of enterprises with biometric authentication (1);Total;19.28 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;18.35 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;18.15 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.B % of enterprises with biometric authentication (1);250 or more;33.78 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;26.19 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;24.00 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;28.36 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;44.19 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.D % of enterprises with encryption techniques (1);Total;34.82 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;31.31 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;39.49 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.D % of enterprises with encryption techniques (1);250 or more;59.66 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.E % of enterprises with data backup in a separate location (1);Total;88.52 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;86.28 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;94.03 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.E % of enterprises with data backup in a separate location (1);250 or more;96.08 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.F % of enterprises with control of network access (1);Total;64.19 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.F % of enterprises with control of network access (1);From 10 to 49;59.75 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.F % of enterprises with control of network access (1);From 50 to 249;73.52 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.F % of enterprises with control of network access (1);250 or more;84.30 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.G % of enterprises with a Virtual Private Network (1);Total;43.26 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;36.95 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;54.21 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;79.49 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.H % of enterprises with an ICT security monitoring system;Total;39.02 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;34.60 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;46.66 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.H % of enterprises with an ICT security monitoring system;250 or more;64.49 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;32.91 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;28.29 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;40.14 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;62.14 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.J % of enterprises with an ICT risk assessment (1);Total;27.75 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;22.44 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;36.95 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;58.34 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.K % of enterprises with an ICT security test (1);Total;35.16 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;31.17 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;40.86 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.1.K % of enterprises with an ICT security test (1);250 or more;62.20 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.A % of enterprises with voluntary ICT security training;Total;35.25 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;30.53 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;45.18 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.A % of enterprises with voluntary ICT security training;250 or more;66.12 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.B % of enterprises with obligations training on ICT security;Total;19.41 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;16.80 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;23.69 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.B % of enterprises with obligations training on ICT security;250 or more;40.84 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.C % of enterprises with ICT security obligations by contract;Total;19.08 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;16.76 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;24.05 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.2.C % of enterprises with ICT security obligations by contract;250 or more;33.98 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.3 % of enterprises with ICT security documentation;Total;27.56 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.3 % of enterprises with ICT security documentation;From 10 to 49;24.09 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.3 % of enterprises with ICT security documentation;From 50 to 249;32.64 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.3 % of enterprises with ICT security documentation;250 or more;58.49 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;77.27 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;77.45 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;74.86 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;81.07 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;13.60 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;11.56 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;18.73 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;15.09 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;9.14 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;10.99 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;6.41 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;3.83 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5 % of enterprises with a security incident;Total;16.49 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5 % of enterprises with a security incident;From 10 to 49;15.41 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5 % of enterprises with a security incident;From 50 to 249;19.15 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5 % of enterprises with a security incident;250 or more;22.14 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;72.59 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;68.37 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;83.98 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;78.46 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;24.56 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;21.09 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;32.93 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;32.58 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;25.94 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;28.08 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;25.30 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;6.72 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;19.70 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;21.09 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;18.09 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;11.01 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;9.97 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;10.76 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;9.06 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;5.05 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;4.50 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;3.39 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;7.40 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;6.29 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;36.81 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;34.98 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;37.87 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;58.96 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.6.B % of enterprises whose ICT security is handled by external providers;Total;55.60 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;53.05 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;62.84 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;65.42 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.7 % of enterprises that have insurance against ICT security incidents;Total;18.89 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;15.88 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;25.93 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;36.19 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1 % of enterprises that apply some ICT security measure;Total;98.43 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1 % of enterprises that apply some ICT security measure;From 10 to 49;98.03 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1 % of enterprises that apply some ICT security measure;From 50 to 249;99.73 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1 % of enterprises that apply some ICT security measure;250 or more;99.28 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.A % of enterprises with strong password authentication (1);Total;98.04 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.A % of enterprises with strong password authentication (1);From 10 to 49;97.63 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.A % of enterprises with strong password authentication (1);From 50 to 249;99.41 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.A % of enterprises with strong password authentication (1);250 or more;98.75 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.B % of enterprises with biometric authentication (1);Total;34.50 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.B % of enterprises with biometric authentication (1);From 10 to 49;31.42 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.B % of enterprises with biometric authentication (1);From 50 to 249;42.03 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.B % of enterprises with biometric authentication (1);250 or more;50.67 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);Total;55.26 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 10 to 49;49.78 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);From 50 to 249;69.26 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.C % of enterprises with a combination of at least two authentication mechanisms (1);250 or more;81.44 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.D % of enterprises with encryption techniques (1);Total;69.96 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.D % of enterprises with encryption techniques (1);From 10 to 49;65.67 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.D % of enterprises with encryption techniques (1);From 50 to 249;80.76 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.D % of enterprises with encryption techniques (1);250 or more;91.17 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.E % of enterprises with data backup in a separate location (1);Total;98.23 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.E % of enterprises with data backup in a separate location (1);From 10 to 49;98.04 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.E % of enterprises with data backup in a separate location (1);From 50 to 249;98.69 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.E % of enterprises with data backup in a separate location (1);250 or more;99.27 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.F % of enterprises with control of network access (1);Total;87.64 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.F % of enterprises with control of network access (1);From 10 to 49;86.19 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.F % of enterprises with control of network access (1);From 50 to 249;90.69 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.F % of enterprises with control of network access (1);250 or more;97.25 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.G % of enterprises with a Virtual Private Network (1);Total;79.80 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.G % of enterprises with a Virtual Private Network (1);From 10 to 49;75.22 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.G % of enterprises with a Virtual Private Network (1);From 50 to 249;92.76 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.G % of enterprises with a Virtual Private Network (1);250 or more;96.68 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.H % of enterprises with an ICT security monitoring system;Total;74.35 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.H % of enterprises with an ICT security monitoring system;From 10 to 49;71.84 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.H % of enterprises with an ICT security monitoring system;From 50 to 249;79.10 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.H % of enterprises with an ICT security monitoring system;250 or more;93.02 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.I % of enterprises that maintain log files to analyze security incidents (1);Total;72.70 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 10 to 49;68.04 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.I % of enterprises that maintain log files to analyze security incidents (1);From 50 to 249;84.98 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.I % of enterprises that maintain log files to analyze security incidents (1);250 or more;93.51 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.J % of enterprises with an ICT risk assessment (1);Total;65.00 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.J % of enterprises with an ICT risk assessment (1);From 10 to 49;59.34 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.J % of enterprises with an ICT risk assessment (1);From 50 to 249;79.23 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.J % of enterprises with an ICT risk assessment (1);250 or more;92.93 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.K % of enterprises with an ICT security test (1);Total;66.33 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.K % of enterprises with an ICT security test (1);From 10 to 49;61.49 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.K % of enterprises with an ICT security test (1);From 50 to 249;77.90 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.1.K % of enterprises with an ICT security test (1);250 or more;92.67 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.A % of enterprises with voluntary ICT security training;Total;77.49 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.A % of enterprises with voluntary ICT security training;From 10 to 49;74.07 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.A % of enterprises with voluntary ICT security training;From 50 to 249;86.94 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.A % of enterprises with voluntary ICT security training;250 or more;91.88 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.B % of enterprises with obligations training on ICT security;Total;50.08 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.B % of enterprises with obligations training on ICT security;From 10 to 49;43.57 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.B % of enterprises with obligations training on ICT security;From 50 to 249;65.77 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.B % of enterprises with obligations training on ICT security;250 or more;86.40 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.C % of enterprises with ICT security obligations by contract;Total;48.30 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.C % of enterprises with ICT security obligations by contract;From 10 to 49;45.53 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.C % of enterprises with ICT security obligations by contract;From 50 to 249;56.08 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.2.C % of enterprises with ICT security obligations by contract;250 or more;59.43 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.3 % of enterprises with ICT security documentation;Total;70.13 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.3 % of enterprises with ICT security documentation;From 10 to 49;65.57 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.3 % of enterprises with ICT security documentation;From 50 to 249;82.64 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.3 % of enterprises with ICT security documentation;250 or more;89.75 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);Total;80.36 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 10 to 49;76.84 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);From 50 to 249;87.71 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.A % of enterprises with ICT security documentation: reviewed within the last 12 months (2);250 or more;92.49 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);Total;13.34 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 10 to 49;14.95 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);From 50 to 249;10.77 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.B % of enterprises with ICT security documentation: reviewed between 12 and 24 months (2);250 or more;4.91 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);Total;6.30 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 10 to 49;8.22 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);From 50 to 249;1.51 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.4.C % of enterprises with ICT security documentation: reviewed more than 24 months ago (2);250 or more;2.60 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5 % of enterprises with a security incident;Total;20.43 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5 % of enterprises with a security incident;From 10 to 49;18.03 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5 % of enterprises with a security incident;From 50 to 249;28.64 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5 % of enterprises with a security incident;250 or more;24.22 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);Total;82.62 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 10 to 49;82.42 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);From 50 to 249;84.99 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.A % of enterprises by type of incident: ICT services unavailable due to hardware or software failure (3);250 or more;73.81 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);Total;20.49 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 10 to 49;20.95 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);From 50 to 249;16.76 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.B % of enterprises by type of incident: ICT services not available due to external attack (3);250 or more;32.83 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);Total;21.07 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 10 to 49;25.63 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);From 50 to 249;10.37 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.C % of enterprises by type of incident: Destruction or corruption of data due to hardware or software failure (3);250 or more;19.75 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);Total;10.86 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 10 to 49;12.04 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);From 50 to 249;7.02 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.D % of enterprises by type of incident: Destruction or corruption of data due to external attack(3);250 or more;15.57 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);Total;6.50 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 10 to 49;4.03 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);From 50 to 249;12.78 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.E % of enterprises by type of incident: Disclosure of confidential data due to external intrusions (3);250 or more;4.85 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);Total;7.32 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 10 to 49;6.32 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);From 50 to 249;9.33 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.5.F % of enterprises by type of incident: Disclosure of confidential data due the employees themselves (3);250 or more;9.25 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.6.A % of enterprises whose ICT security is handled by the employees themselves;Total;82.77 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 10 to 49;80.36 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.6.A % of enterprises whose ICT security is handled by the employees themselves;From 50 to 249;89.22 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.6.A % of enterprises whose ICT security is handled by the employees themselves;250 or more;93.63 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.6.B % of enterprises whose ICT security is handled by external providers;Total;36.30 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.6.B % of enterprises whose ICT security is handled by external providers;From 10 to 49;35.44 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.6.B % of enterprises whose ICT security is handled by external providers;From 50 to 249;37.34 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.6.B % of enterprises whose ICT security is handled by external providers;250 or more;45.19 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.7 % of enterprises that have insurance against ICT security incidents;Total;45.14 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.7 % of enterprises that have insurance against ICT security incidents;From 10 to 49;40.75 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.7 % of enterprises that have insurance against ICT security incidents;From 50 to 249;55.42 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);G.7 % of enterprises that have insurance against ICT security incidents;250 or more;70.76