Activity grouping (except CNAE 56, 64-66 and 95.1);Main variables;Size of the enterprise;Total Total Enterprises;H.1 % of enterprises that apply some ICT security measure (0);Total;91,27 Total Enterprises;H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;90,28 Total Enterprises;H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;95,24 Total Enterprises;H.1 % of enterprises that apply some ICT security measure (0);250 or more;98,94 Total Enterprises;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;91,09 Total Enterprises;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;89,91 Total Enterprises;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;95,66 Total Enterprises;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;98,76 Total Enterprises;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;22,22 Total Enterprises;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;19,04 Total Enterprises;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;32,94 Total Enterprises;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;50,18 Total Enterprises;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;34,55 Total Enterprises;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;29,35 Total Enterprises;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;52,29 Total Enterprises;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;79,22 Total Enterprises;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;40,41 Total Enterprises;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;35,98 Total Enterprises;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;55,37 Total Enterprises;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;79,48 Total Enterprises;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;91,29 Total Enterprises;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;90,35 Total Enterprises;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;94,83 Total Enterprises;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;97,82 Total Enterprises;H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;69,59 Total Enterprises;H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;65,93 Total Enterprises;H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;83,36 Total Enterprises;H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;95,4 Total Enterprises;H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;52,3 Total Enterprises;H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;46,52 Total Enterprises;H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;74,43 Total Enterprises;H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;91,36 Total Enterprises;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;39,3 Total Enterprises;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;34,2 Total Enterprises;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;56,96 Total Enterprises;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;81,93 Total Enterprises;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;37,3 Total Enterprises;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;31,47 Total Enterprises;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;58,03 Total Enterprises;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;83,83 Total Enterprises;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;29,83 Total Enterprises;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;24,57 Total Enterprises;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;47,5 Total Enterprises;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;76,22 Total Enterprises;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;35,33 Total Enterprises;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;30,25 Total Enterprises;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;52,36 Total Enterprises;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;80,54 Total Enterprises;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;63,52 Total Enterprises;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;60,21 Total Enterprises;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;75,1 Total Enterprises;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;90,75 Total Enterprises;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;77,46 Total Enterprises;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;74,68 Total Enterprises;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;85,21 Total Enterprises;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;92,96 Total Enterprises;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;44,93 Total Enterprises;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;41,04 Total Enterprises;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;53,52 Total Enterprises;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;74,84 Total Enterprises;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;40,01 Total Enterprises;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;37,17 Total Enterprises;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;47,2 Total Enterprises;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;58,46 Total Enterprises;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;31,86 Total Enterprises;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;27,5 Total Enterprises;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;46,58 Total Enterprises;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;77,56 Total Enterprises;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;70,73 Total Enterprises;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;68,41 Total Enterprises;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;74,21 Total Enterprises;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;82,48 Total Enterprises;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;19,13 Total Enterprises;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;20,14 Total Enterprises;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;18,56 Total Enterprises;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;11,43 Total Enterprises;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;10,14 Total Enterprises;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;11,45 Total Enterprises;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;7,24 Total Enterprises;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;6,08 Total Enterprises;H.5 % of enterprises that have experienced an ICT security incident (0);Total;16,19 Total Enterprises;H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;14,13 Total Enterprises;H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;23,55 Total Enterprises;H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;35,99 Total Enterprises;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;74,6 Total Enterprises;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;73,38 Total Enterprises;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;77,22 Total Enterprises;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;79,16 Total Enterprises;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;19,95 Total Enterprises;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;19,3 Total Enterprises;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;21,41 Total Enterprises;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;22,22 Total Enterprises;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;22,08 Total Enterprises;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;22,36 Total Enterprises;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;22,04 Total Enterprises;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;19,29 Total Enterprises;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;16,19 Total Enterprises;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;17,35 Total Enterprises;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;13,17 Total Enterprises;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;13,45 Total Enterprises;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;8,38 Total Enterprises;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;7,63 Total Enterprises;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;9,56 Total Enterprises;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;12,52 Total Enterprises;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;5,33 Total Enterprises;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;4,9 Total Enterprises;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;6,08 Total Enterprises;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;7,56 1. Total Industry (CNAE 10-39);H.1 % of enterprises that apply some ICT security measure (0);Total;91,9 1. Total Industry (CNAE 10-39);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;90,45 1. Total Industry (CNAE 10-39);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;97,27 1. Total Industry (CNAE 10-39);H.1 % of enterprises that apply some ICT security measure (0);250 or more;100 1. Total Industry (CNAE 10-39);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;90,23 1. Total Industry (CNAE 10-39);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;88,48 1. Total Industry (CNAE 10-39);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;96,08 1. Total Industry (CNAE 10-39);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;99,87 1. Total Industry (CNAE 10-39);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;21,7 1. Total Industry (CNAE 10-39);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;17,25 1. Total Industry (CNAE 10-39);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;34,99 1. Total Industry (CNAE 10-39);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;52,5 1. Total Industry (CNAE 10-39);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;30,27 1. Total Industry (CNAE 10-39);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;22,67 1. Total Industry (CNAE 10-39);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;52,88 1. Total Industry (CNAE 10-39);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;83,33 1. Total Industry (CNAE 10-39);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;34,93 1. Total Industry (CNAE 10-39);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;28,63 1. Total Industry (CNAE 10-39);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;52,9 1. Total Industry (CNAE 10-39);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;82,32 1. Total Industry (CNAE 10-39);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;92,14 1. Total Industry (CNAE 10-39);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;90,9 1. Total Industry (CNAE 10-39);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;96,48 1. Total Industry (CNAE 10-39);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;98,12 1. Total Industry (CNAE 10-39);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;70,15 1. Total Industry (CNAE 10-39);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;65,27 1. Total Industry (CNAE 10-39);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;86,46 1. Total Industry (CNAE 10-39);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;96,73 1. Total Industry (CNAE 10-39);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;51,03 1. Total Industry (CNAE 10-39);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;42,5 1. Total Industry (CNAE 10-39);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;80,03 1. Total Industry (CNAE 10-39);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;95,5 1. Total Industry (CNAE 10-39);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;35,55 1. Total Industry (CNAE 10-39);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;27,9 1. Total Industry (CNAE 10-39);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;59,2 1. Total Industry (CNAE 10-39);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;85,29 1. Total Industry (CNAE 10-39);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;35,01 1. Total Industry (CNAE 10-39);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;26,84 1. Total Industry (CNAE 10-39);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;60,41 1. Total Industry (CNAE 10-39);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;87,56 1. Total Industry (CNAE 10-39);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;26,45 1. Total Industry (CNAE 10-39);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;19,3 1. Total Industry (CNAE 10-39);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;47,1 1. Total Industry (CNAE 10-39);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;79,28 1. Total Industry (CNAE 10-39);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;33,58 1. Total Industry (CNAE 10-39);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;26,76 1. Total Industry (CNAE 10-39);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;52,92 1. Total Industry (CNAE 10-39);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;85,34 1. Total Industry (CNAE 10-39);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;59,78 1. Total Industry (CNAE 10-39);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;54,42 1. Total Industry (CNAE 10-39);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;76,74 1. Total Industry (CNAE 10-39);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;93,04 1. Total Industry (CNAE 10-39);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;76,96 1. Total Industry (CNAE 10-39);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;73,16 1. Total Industry (CNAE 10-39);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;84,9 1. Total Industry (CNAE 10-39);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;92,84 1. Total Industry (CNAE 10-39);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;40,06 1. Total Industry (CNAE 10-39);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;34,4 1. Total Industry (CNAE 10-39);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;48,23 1. Total Industry (CNAE 10-39);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;76,42 1. Total Industry (CNAE 10-39);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;36,77 1. Total Industry (CNAE 10-39);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;33,56 1. Total Industry (CNAE 10-39);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;42,02 1. Total Industry (CNAE 10-39);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;55,21 1. Total Industry (CNAE 10-39);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;28,34 1. Total Industry (CNAE 10-39);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;22,23 1. Total Industry (CNAE 10-39);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;46,43 1. Total Industry (CNAE 10-39);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;82,02 1. Total Industry (CNAE 10-39);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;68,19 1. Total Industry (CNAE 10-39);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;66,55 1. Total Industry (CNAE 10-39);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;67,13 1. Total Industry (CNAE 10-39);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;80,48 1. Total Industry (CNAE 10-39);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;21,11 1. Total Industry (CNAE 10-39);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;21,05 1. Total Industry (CNAE 10-39);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;24,65 1. Total Industry (CNAE 10-39);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;12,75 1. Total Industry (CNAE 10-39);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;10,69 1. Total Industry (CNAE 10-39);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;12,4 1. Total Industry (CNAE 10-39);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;8,22 1. Total Industry (CNAE 10-39);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;6,77 1. Total Industry (CNAE 10-39);H.5 % of enterprises that have experienced an ICT security incident (0);Total;16,04 1. Total Industry (CNAE 10-39);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;13,27 1. Total Industry (CNAE 10-39);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;24,68 1. Total Industry (CNAE 10-39);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;38,44 1. Total Industry (CNAE 10-39);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;79,56 1. Total Industry (CNAE 10-39);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;78,84 1. Total Industry (CNAE 10-39);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;80,64 1. Total Industry (CNAE 10-39);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;81,97 1. Total Industry (CNAE 10-39);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;14,1 1. Total Industry (CNAE 10-39);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;12,39 1. Total Industry (CNAE 10-39);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;16,68 1. Total Industry (CNAE 10-39);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;19,67 1. Total Industry (CNAE 10-39);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;22,98 1. Total Industry (CNAE 10-39);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;26,67 1. Total Industry (CNAE 10-39);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;14,4 1. Total Industry (CNAE 10-39);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;19,37 1. Total Industry (CNAE 10-39);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;12,32 1. Total Industry (CNAE 10-39);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;13,04 1. Total Industry (CNAE 10-39);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;10,49 1. Total Industry (CNAE 10-39);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;12,1 1. Total Industry (CNAE 10-39);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;7,89 1. Total Industry (CNAE 10-39);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;7,86 1. Total Industry (CNAE 10-39);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;7,09 1. Total Industry (CNAE 10-39);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;10,32 1. Total Industry (CNAE 10-39);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;3,13 1. Total Industry (CNAE 10-39);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;2,95 1. Total Industry (CNAE 10-39);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;3,05 1. Total Industry (CNAE 10-39);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;4,72 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1 % of enterprises that apply some ICT security measure (0);Total;90,21 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;88,93 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;95,51 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1 % of enterprises that apply some ICT security measure (0);250 or more;100 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;90,05 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;88,43 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;96,47 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;100 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;22,95 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;19,18 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;37,18 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;49,55 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;27,22 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;20,46 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;52,05 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;78,19 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;30,94 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;25,71 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;48,71 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;77,41 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;90,53 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;89,07 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;96,78 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;97,18 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;67,11 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;62,36 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;86,12 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;95,54 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;47,3 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;39,65 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;78,49 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;90,62 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;32,85 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;26,67 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;54,9 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;82,46 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;31,74 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;24,56 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;58,61 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;83,5 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;23,23 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;17,47 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;42,98 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;73,5 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;30,72 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;24,98 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;50,83 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;78,54 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;60,67 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;56,7 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;75,37 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;90,05 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;75 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;72,72 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;80,39 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;89,39 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;32,67 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;27,26 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;44,9 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;69,28 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;38,35 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;36,15 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;44,23 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;49,48 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;28,17 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;24,73 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;38,01 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;75,91 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;69,31 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;69,86 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;64,65 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;75,84 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;20,81 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;19,22 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;28,4 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;16,48 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;9,89 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;10,93 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;6,95 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;7,68 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5 % of enterprises that have experienced an ICT security incident (0);Total;19,36 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;16,97 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;27,62 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;45,59 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;84,18 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;84,96 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;82,7 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;80,42 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;10,64 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;8,58 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;16,63 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;14,2 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;30,82 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;34,18 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;20,5 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;26,8 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;6,81 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;4,96 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;12,03 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;10,53 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;5,63 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;4,78 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;8,2 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;6,72 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;3,58 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;3,83 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;2,16 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;5,18 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1 % of enterprises that apply some ICT security measure (0);Total;92,62 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;90,58 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;97,15 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1 % of enterprises that apply some ICT security measure (0);250 or more;100 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;90 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;87,17 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;95,63 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;100 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;22,81 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;15,81 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;34,9 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;53,64 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;36,18 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;24,69 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;54,47 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;91,91 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;39,28 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;28,65 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;57,52 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;86,37 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;94,14 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;92,28 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;98,37 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;98,93 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;76,46 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;69,47 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;90,95 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;99,18 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;56,33 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;42,66 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;85,21 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;99,03 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;42,52 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;30,21 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;66,19 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;88,68 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;41,2 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;27,19 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;68,91 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;91,14 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;30,18 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;17,76 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;52,76 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;81 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;36,78 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;23,56 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;62,08 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;86,7 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;59,95 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;50,24 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;78,63 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;96,24 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;82,93 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;77,01 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;89,88 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;95,39 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;45 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;35,92 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;48,77 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;82,92 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;38,2 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;35,04 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;37,09 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;57,93 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;30,25 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;19,86 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;48,23 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;85,05 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;72,67 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;68,06 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;74,01 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;82,12 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;18,09 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;19,28 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;19,16 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;12,87 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;9,25 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;12,67 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;6,82 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;5,01 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5 % of enterprises that have experienced an ICT security incident (0);Total;17,53 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;14,74 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;20,95 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;37,08 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;82,79 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;79,17 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;91,33 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;82,4 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;12,36 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;12,72 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;10,75 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;13,82 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;10,64 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;10,87 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;6,61 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;17,43 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;13,13 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;17,52 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;4,84 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;9,61 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;10,62 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;11,8 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;6,17 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;14,01 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;0,85 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;0 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;1,93 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;2,55 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1 % of enterprises that apply some ICT security measure (0);Total;90,08 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;88,42 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;98,71 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1 % of enterprises that apply some ICT security measure (0);250 or more;100 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;89,02 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;87,3 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;96,78 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;100 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;16,08 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;13,53 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;26,1 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;42,14 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;29,32 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;23,98 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;50,22 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;84,36 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;33,25 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;28,76 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;51,53 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;74,92 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;93,41 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;93,12 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;94,42 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;97,17 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;70,66 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;67,95 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;81,5 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;97,17 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;45,58 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;38,9 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;74,14 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;98,3 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;30,36 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;24,69 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;53,41 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;83,41 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;29,71 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;23,97 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;52,59 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;86,4 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;21,72 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;15,85 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;45,26 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;78,56 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;29 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;24,16 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;45,75 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;93,59 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;55,55 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;50,95 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;74,62 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;95,89 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;68,98 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;64,66 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;81,28 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;88,6 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;44,58 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;41,93 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;48,85 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;73,68 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;29,59 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;27,71 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;31,96 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;53,48 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;23,92 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;19,16 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;44,36 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;81,74 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;63,8 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;59,01 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;70,42 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;85,73 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;18,44 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;19,38 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;19,82 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;4,48 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;17,75 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;21,61 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;9,76 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;9,79 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5 % of enterprises that have experienced an ICT security incident (0);Total;10,42 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;8,13 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;20,33 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;37,61 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;69,09 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;67,15 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;70,28 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;81,9 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;12,71 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;11,99 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;13,69 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;15,5 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;19,58 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;19,62 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;19,88 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;18,1 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;16,73 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;18,39 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;13,54 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;13,59 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;8,98 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;9,08 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;10,32 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;3,22 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;6,75 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;6,41 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;8,83 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;2,25 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1 % of enterprises that apply some ICT security measure (0);Total;94,59 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;93,59 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;98,21 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1 % of enterprises that apply some ICT security measure (0);250 or more;100 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;90,43 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;88,96 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;95,19 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;99,47 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;22,5 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;17,42 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;37,92 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;58,04 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;29,5 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;21,55 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;54,25 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;82,21 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;36 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;29,5 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;54,24 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;87,47 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;92,37 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;91,31 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;95,67 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;99,44 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;68,77 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;63,62 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;86,49 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;95,9 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;55,92 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;47,81 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;84,21 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;96,87 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;37,15 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;29,22 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;62,86 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;85,57 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;38,23 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;30,53 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;62,43 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;88,3 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;30,4 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;23,73 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;48,84 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;84,47 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;36,74 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;30,6 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;53,09 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;89,21 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;59,76 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;54,33 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;77,39 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;92,86 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;80,41 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;76,85 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;87,83 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;95,5 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;42,17 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;36,3 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;50,77 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;79,86 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;37,05 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;31,78 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;49,07 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;55,75 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;28,45 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;20,21 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;55,43 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;86,55 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;65,03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;62,83 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;62,25 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;83,55 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;26,84 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;27,58 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;31,24 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;11,09 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;8,13 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;9,59 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;6,52 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;5,36 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5 % of enterprises that have experienced an ICT security incident (0);Total;13,86 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;10,81 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;24,66 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;32,03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;77,03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;73,87 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;80,8 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;87,03 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;19,81 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;20,7 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;14,98 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;29,54 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;18,37 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;24,75 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;6,55 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;11,97 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;20,13 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;24,58 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;12,23 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;14,6 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;9,53 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;11,18 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;5,96 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;9,63 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;2,1 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;1,46 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;3,14 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;3,17 1.5. Energy and water (CNAE 35-39);H.1 % of enterprises that apply some ICT security measure (0);Total;95,91 1.5. Energy and water (CNAE 35-39);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;94,47 1.5. Energy and water (CNAE 35-39);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;100 1.5. Energy and water (CNAE 35-39);H.1 % of enterprises that apply some ICT security measure (0);250 or more;100 1.5. Energy and water (CNAE 35-39);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;95,15 1.5. Energy and water (CNAE 35-39);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;94,13 1.5. Energy and water (CNAE 35-39);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;97,11 1.5. Energy and water (CNAE 35-39);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;100 1.5. Energy and water (CNAE 35-39);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;24,72 1.5. Energy and water (CNAE 35-39);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;19,11 1.5. Energy and water (CNAE 35-39);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;34,11 1.5. Energy and water (CNAE 35-39);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;55,16 1.5. Energy and water (CNAE 35-39);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;42,11 1.5. Energy and water (CNAE 35-39);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;35,21 1.5. Energy and water (CNAE 35-39);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;53,69 1.5. Energy and water (CNAE 35-39);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;79,49 1.5. Energy and water (CNAE 35-39);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;51,21 1.5. Energy and water (CNAE 35-39);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;45,96 1.5. Energy and water (CNAE 35-39);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;59,22 1.5. Energy and water (CNAE 35-39);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;81,74 1.5. Energy and water (CNAE 35-39);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;92,76 1.5. Energy and water (CNAE 35-39);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;91,1 1.5. Energy and water (CNAE 35-39);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;97,48 1.5. Energy and water (CNAE 35-39);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;96,62 1.5. Energy and water (CNAE 35-39);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;78,96 1.5. Energy and water (CNAE 35-39);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;75,16 1.5. Energy and water (CNAE 35-39);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;86,72 1.5. Energy and water (CNAE 35-39);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;95,89 1.5. Energy and water (CNAE 35-39);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;57,75 1.5. Energy and water (CNAE 35-39);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;50,49 1.5. Energy and water (CNAE 35-39);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;70,58 1.5. Energy and water (CNAE 35-39);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;95,35 1.5. Energy and water (CNAE 35-39);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;45,06 1.5. Energy and water (CNAE 35-39);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;36,62 1.5. Energy and water (CNAE 35-39);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;60,76 1.5. Energy and water (CNAE 35-39);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;86,75 1.5. Energy and water (CNAE 35-39);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;43,45 1.5. Energy and water (CNAE 35-39);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;35,45 1.5. Energy and water (CNAE 35-39);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;55,59 1.5. Energy and water (CNAE 35-39);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;90,37 1.5. Energy and water (CNAE 35-39);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;35,83 1.5. Energy and water (CNAE 35-39);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;27,65 1.5. Energy and water (CNAE 35-39);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;49,5 1.5. Energy and water (CNAE 35-39);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;80,27 1.5. Energy and water (CNAE 35-39);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;45,02 1.5. Energy and water (CNAE 35-39);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;38,8 1.5. Energy and water (CNAE 35-39);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;53,26 1.5. Energy and water (CNAE 35-39);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;84,62 1.5. Energy and water (CNAE 35-39);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;67,1 1.5. Energy and water (CNAE 35-39);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;60,86 1.5. Energy and water (CNAE 35-39);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;80,92 1.5. Energy and water (CNAE 35-39);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;91,84 1.5. Energy and water (CNAE 35-39);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;82,42 1.5. Energy and water (CNAE 35-39);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;78 1.5. Energy and water (CNAE 35-39);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;89,75 1.5. Energy and water (CNAE 35-39);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;94,14 1.5. Energy and water (CNAE 35-39);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;53,18 1.5. Energy and water (CNAE 35-39);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;50,21 1.5. Energy and water (CNAE 35-39);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;52,21 1.5. Energy and water (CNAE 35-39);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;75,02 1.5. Energy and water (CNAE 35-39);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;41,76 1.5. Energy and water (CNAE 35-39);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;37,96 1.5. Energy and water (CNAE 35-39);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;42,23 1.5. Energy and water (CNAE 35-39);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;65,65 1.5. Energy and water (CNAE 35-39);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;39,11 1.5. Energy and water (CNAE 35-39);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;30,5 1.5. Energy and water (CNAE 35-39);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;56,84 1.5. Energy and water (CNAE 35-39);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;81,94 1.5. Energy and water (CNAE 35-39);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;72,96 1.5. Energy and water (CNAE 35-39);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;73,34 1.5. Energy and water (CNAE 35-39);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;70,58 1.5. Energy and water (CNAE 35-39);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;75,91 1.5. Energy and water (CNAE 35-39);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;15,32 1.5. Energy and water (CNAE 35-39);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;18,41 1.5. Energy and water (CNAE 35-39);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;9,17 1.5. Energy and water (CNAE 35-39);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;14,71 1.5. Energy and water (CNAE 35-39);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;11,73 1.5. Energy and water (CNAE 35-39);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;8,25 1.5. Energy and water (CNAE 35-39);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;20,25 1.5. Energy and water (CNAE 35-39);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;9,38 1.5. Energy and water (CNAE 35-39);H.5 % of enterprises that have experienced an ICT security incident (0);Total;17,42 1.5. Energy and water (CNAE 35-39);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;12,06 1.5. Energy and water (CNAE 35-39);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;31,07 1.5. Energy and water (CNAE 35-39);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;37,01 1.5. Energy and water (CNAE 35-39);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;64,67 1.5. Energy and water (CNAE 35-39);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;61,63 1.5. Energy and water (CNAE 35-39);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;64,35 1.5. Energy and water (CNAE 35-39);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;75,82 1.5. Energy and water (CNAE 35-39);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;28,34 1.5. Energy and water (CNAE 35-39);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;18,19 1.5. Energy and water (CNAE 35-39);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;39,72 1.5. Energy and water (CNAE 35-39);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;37,38 1.5. Energy and water (CNAE 35-39);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;17,68 1.5. Energy and water (CNAE 35-39);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;19,49 1.5. Energy and water (CNAE 35-39);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;16,61 1.5. Energy and water (CNAE 35-39);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;13,84 1.5. Energy and water (CNAE 35-39);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;16,39 1.5. Energy and water (CNAE 35-39);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;24,15 1.5. Energy and water (CNAE 35-39);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;4,33 1.5. Energy and water (CNAE 35-39);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;17,13 1.5. Energy and water (CNAE 35-39);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;10,27 1.5. Energy and water (CNAE 35-39);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;11,99 1.5. Energy and water (CNAE 35-39);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;1,88 1.5. Energy and water (CNAE 35-39);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;23,42 1.5. Energy and water (CNAE 35-39);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;2,12 1.5. Energy and water (CNAE 35-39);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;0 1.5. Energy and water (CNAE 35-39);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;0 1.5. Energy and water (CNAE 35-39);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;14,19 2. Total Construction (CNAE 41-43);H.1 % of enterprises that apply some ICT security measure (0);Total;87,38 2. Total Construction (CNAE 41-43);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;86,86 2. Total Construction (CNAE 41-43);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;91,02 2. Total Construction (CNAE 41-43);H.1 % of enterprises that apply some ICT security measure (0);250 or more;99,01 2. Total Construction (CNAE 41-43);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;89,11 2. Total Construction (CNAE 41-43);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;88,57 2. Total Construction (CNAE 41-43);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;92,78 2. Total Construction (CNAE 41-43);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;99,38 2. Total Construction (CNAE 41-43);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;20,3 2. Total Construction (CNAE 41-43);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;19,64 2. Total Construction (CNAE 41-43);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;23,35 2. Total Construction (CNAE 41-43);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;48,92 2. Total Construction (CNAE 41-43);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;24,89 2. Total Construction (CNAE 41-43);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;23 2. Total Construction (CNAE 41-43);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;36,44 2. Total Construction (CNAE 41-43);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;73,55 2. Total Construction (CNAE 41-43);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;30,72 2. Total Construction (CNAE 41-43);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;29,55 2. Total Construction (CNAE 41-43);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;36,96 2. Total Construction (CNAE 41-43);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;71,01 2. Total Construction (CNAE 41-43);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;87 2. Total Construction (CNAE 41-43);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;86,5 2. Total Construction (CNAE 41-43);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;90,28 2. Total Construction (CNAE 41-43);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;97,33 2. Total Construction (CNAE 41-43);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;54,1 2. Total Construction (CNAE 41-43);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;52,07 2. Total Construction (CNAE 41-43);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;67,95 2. Total Construction (CNAE 41-43);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;91,58 2. Total Construction (CNAE 41-43);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;34,88 2. Total Construction (CNAE 41-43);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;31,3 2. Total Construction (CNAE 41-43);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;60,34 2. Total Construction (CNAE 41-43);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;88,72 2. Total Construction (CNAE 41-43);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;25,04 2. Total Construction (CNAE 41-43);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;23,46 2. Total Construction (CNAE 41-43);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;33,83 2. Total Construction (CNAE 41-43);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;76,33 2. Total Construction (CNAE 41-43);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;19,36 2. Total Construction (CNAE 41-43);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;17,05 2. Total Construction (CNAE 41-43);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;33,96 2. Total Construction (CNAE 41-43);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;74,39 2. Total Construction (CNAE 41-43);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;13,06 2. Total Construction (CNAE 41-43);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;11,07 2. Total Construction (CNAE 41-43);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;25,12 2. Total Construction (CNAE 41-43);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;67,01 2. Total Construction (CNAE 41-43);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;20,67 2. Total Construction (CNAE 41-43);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;18,97 2. Total Construction (CNAE 41-43);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;30,55 2. Total Construction (CNAE 41-43);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;71,4 2. Total Construction (CNAE 41-43);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;52,03 2. Total Construction (CNAE 41-43);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;51,06 2. Total Construction (CNAE 41-43);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;57,07 2. Total Construction (CNAE 41-43);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;87,2 2. Total Construction (CNAE 41-43);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;65,11 2. Total Construction (CNAE 41-43);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;61,8 2. Total Construction (CNAE 41-43);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;86,62 2. Total Construction (CNAE 41-43);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;90,9 2. Total Construction (CNAE 41-43);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;40,78 2. Total Construction (CNAE 41-43);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;40,19 2. Total Construction (CNAE 41-43);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;41,89 2. Total Construction (CNAE 41-43);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;65,86 2. Total Construction (CNAE 41-43);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;38,17 2. Total Construction (CNAE 41-43);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;38,33 2. Total Construction (CNAE 41-43);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;34,39 2. Total Construction (CNAE 41-43);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;57,14 2. Total Construction (CNAE 41-43);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;20,07 2. Total Construction (CNAE 41-43);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;19,13 2. Total Construction (CNAE 41-43);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;24,59 2. Total Construction (CNAE 41-43);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;66,55 2. Total Construction (CNAE 41-43);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;64,97 2. Total Construction (CNAE 41-43);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;63,55 2. Total Construction (CNAE 41-43);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;71,17 2. Total Construction (CNAE 41-43);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;81,13 2. Total Construction (CNAE 41-43);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;26,55 2. Total Construction (CNAE 41-43);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;27,42 2. Total Construction (CNAE 41-43);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;23,36 2. Total Construction (CNAE 41-43);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;13,72 2. Total Construction (CNAE 41-43);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;8,48 2. Total Construction (CNAE 41-43);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;9,03 2. Total Construction (CNAE 41-43);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;5,46 2. Total Construction (CNAE 41-43);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;5,15 2. Total Construction (CNAE 41-43);H.5 % of enterprises that have experienced an ICT security incident (0);Total;12,85 2. Total Construction (CNAE 41-43);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;12,43 2. Total Construction (CNAE 41-43);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;13,98 2. Total Construction (CNAE 41-43);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;44,42 2. Total Construction (CNAE 41-43);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;74,03 2. Total Construction (CNAE 41-43);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;74,44 2. Total Construction (CNAE 41-43);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;71,12 2. Total Construction (CNAE 41-43);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;72,99 2. Total Construction (CNAE 41-43);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;14,74 2. Total Construction (CNAE 41-43);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;14,96 2. Total Construction (CNAE 41-43);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;11,66 2. Total Construction (CNAE 41-43);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;19,92 2. Total Construction (CNAE 41-43);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;22,34 2. Total Construction (CNAE 41-43);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;21,17 2. Total Construction (CNAE 41-43);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;33,46 2. Total Construction (CNAE 41-43);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;15,15 2. Total Construction (CNAE 41-43);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;21,77 2. Total Construction (CNAE 41-43);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;22,69 2. Total Construction (CNAE 41-43);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;16,54 2. Total Construction (CNAE 41-43);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;14,06 2. Total Construction (CNAE 41-43);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;7,86 2. Total Construction (CNAE 41-43);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;6,42 2. Total Construction (CNAE 41-43);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;16,82 2. Total Construction (CNAE 41-43);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;16,85 2. Total Construction (CNAE 41-43);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;6,35 2. Total Construction (CNAE 41-43);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;5,92 2. Total Construction (CNAE 41-43);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;10,1 2. Total Construction (CNAE 41-43);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;4,85 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1 % of enterprises that apply some ICT security measure (0);Total;92,08 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;91,24 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;95,05 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1 % of enterprises that apply some ICT security measure (0);250 or more;98,45 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;91,99 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;90,92 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;95,97 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;98,2 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;22,96 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;19,65 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;33,64 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;49,17 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;39,01 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;34,11 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;54,81 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;77,66 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;45,42 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;41,04 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;59,84 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;78,69 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;92,04 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;91,23 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;94,84 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;97,71 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;73,43 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;70,24 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;84,59 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;95,03 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;57,46 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;52,69 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;74,21 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;89,59 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;44,73 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;40,07 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;59,98 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;80,72 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;43,06 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;37,68 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;61,15 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;82,68 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;35,76 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;30,8 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;51,67 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;75,38 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;39,98 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;35,04 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;55,96 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;78,88 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;68,22 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;65,39 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;77,51 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;89,91 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;80,15 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;78,14 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;85,17 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;93,15 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;47,67 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;43,64 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;57,59 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;74,63 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;41,65 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;38,22 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;51,38 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;60,12 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;36,71 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;32,36 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;50,73 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;76,21 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;72,48 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;69,85 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;77,56 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;83,55 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;17,32 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;18,55 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;15,47 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;10,65 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;10,2 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;11,6 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;6,97 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;5,8 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5 % of enterprises that have experienced an ICT security incident (0);Total;17,19 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;15,02 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;24,78 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;34,33 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;72,65 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;70,99 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;76,23 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;78,22 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;23,47 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;23,08 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;24,67 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;23,73 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;21,65 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;20,99 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;24,46 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;19,59 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;16,64 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;17,68 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;14,09 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;14,1 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;8,7 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;7,85 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;9,97 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;13,29 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;6,04 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;5,39 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;7,09 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, and financial services);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;9,26 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1 % of enterprises that apply some ICT security measure (0);Total;92,63 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;91,97 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;95,86 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1 % of enterprises that apply some ICT security measure (0);250 or more;97,59 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;90,94 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;89,89 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;95,87 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;98,17 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;21,98 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;19,37 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;31,61 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;53,86 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;31,4 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;27 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;49,46 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;75,52 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;37,54 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;33,52 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;54,26 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;76,97 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;91,23 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;90,74 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;92,89 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;97,76 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;72,1 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;69,44 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;83,55 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;95,85 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;54,88 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;50,32 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;75,36 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;91,6 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;38,34 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;33,77 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;57,85 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;80,22 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;36,48 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;31,27 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;59,09 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;82,55 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;30,41 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;26,4 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;46,51 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;72,61 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;34,86 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;31 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;50,13 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;76,88 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;66,26 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;64,17 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;74,18 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;90,6 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;77,24 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;75,12 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;84,45 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;93,69 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;45,04 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;42,38 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;52,75 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;71,06 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;36,2 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;33,31 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;46,48 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;56,48 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;31,21 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;28,18 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;42,72 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;71,1 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;68,58 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;66,71 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;72,12 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;81,96 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;18,95 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;19,66 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;17,97 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;12,83 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;12,47 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;13,63 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;9,92 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;5,21 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5 % of enterprises that have experienced an ICT security incident (0);Total;14,87 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;12,71 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;24,33 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;36,9 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;76,86 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;74,9 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;81,75 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;82,34 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;20,55 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;20,24 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;20,72 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;23,37 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;17,43 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;15,33 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;23,81 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;19,35 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;14,16 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;13,69 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;14,4 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;18,66 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;5,61 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;4,66 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;7,72 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;9,11 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;3,91 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;3,19 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;5,35 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;7,14 3.2. Transport and storage (CNAE 49-53);H.1 % of enterprises that apply some ICT security measure (0);Total;91,58 3.2. Transport and storage (CNAE 49-53);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;90,82 3.2. Transport and storage (CNAE 49-53);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;94,61 3.2. Transport and storage (CNAE 49-53);H.1 % of enterprises that apply some ICT security measure (0);250 or more;98,69 3.2. Transport and storage (CNAE 49-53);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;88,78 3.2. Transport and storage (CNAE 49-53);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;87,43 3.2. Transport and storage (CNAE 49-53);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;94,25 3.2. Transport and storage (CNAE 49-53);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;98,91 3.2. Transport and storage (CNAE 49-53);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;18,87 3.2. Transport and storage (CNAE 49-53);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;16 3.2. Transport and storage (CNAE 49-53);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;28,09 3.2. Transport and storage (CNAE 49-53);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;50,01 3.2. Transport and storage (CNAE 49-53);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;32,54 3.2. Transport and storage (CNAE 49-53);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;28,82 3.2. Transport and storage (CNAE 49-53);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;43,16 3.2. Transport and storage (CNAE 49-53);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;78,38 3.2. Transport and storage (CNAE 49-53);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;37,69 3.2. Transport and storage (CNAE 49-53);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;34,99 3.2. Transport and storage (CNAE 49-53);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;44,01 3.2. Transport and storage (CNAE 49-53);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;76,35 3.2. Transport and storage (CNAE 49-53);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;89,5 3.2. Transport and storage (CNAE 49-53);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;88,26 3.2. Transport and storage (CNAE 49-53);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;94,77 3.2. Transport and storage (CNAE 49-53);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;98,13 3.2. Transport and storage (CNAE 49-53);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;64,85 3.2. Transport and storage (CNAE 49-53);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;61,55 3.2. Transport and storage (CNAE 49-53);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;76,53 3.2. Transport and storage (CNAE 49-53);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;96,62 3.2. Transport and storage (CNAE 49-53);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;45,53 3.2. Transport and storage (CNAE 49-53);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;40,47 3.2. Transport and storage (CNAE 49-53);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;63,52 3.2. Transport and storage (CNAE 49-53);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;93,86 3.2. Transport and storage (CNAE 49-53);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;35,2 3.2. Transport and storage (CNAE 49-53);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;31,25 3.2. Transport and storage (CNAE 49-53);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;47,42 3.2. Transport and storage (CNAE 49-53);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;80,1 3.2. Transport and storage (CNAE 49-53);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;29,98 3.2. Transport and storage (CNAE 49-53);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;25,24 3.2. Transport and storage (CNAE 49-53);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;45,16 3.2. Transport and storage (CNAE 49-53);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;81,77 3.2. Transport and storage (CNAE 49-53);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;23,51 3.2. Transport and storage (CNAE 49-53);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;19,09 3.2. Transport and storage (CNAE 49-53);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;36,59 3.2. Transport and storage (CNAE 49-53);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;76,32 3.2. Transport and storage (CNAE 49-53);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;30,34 3.2. Transport and storage (CNAE 49-53);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;26,51 3.2. Transport and storage (CNAE 49-53);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;40,56 3.2. Transport and storage (CNAE 49-53);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;80,35 3.2. Transport and storage (CNAE 49-53);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;55,62 3.2. Transport and storage (CNAE 49-53);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;51,85 3.2. Transport and storage (CNAE 49-53);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;69,27 3.2. Transport and storage (CNAE 49-53);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;90,51 3.2. Transport and storage (CNAE 49-53);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;72,84 3.2. Transport and storage (CNAE 49-53);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;70,37 3.2. Transport and storage (CNAE 49-53);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;77,01 3.2. Transport and storage (CNAE 49-53);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;93,67 3.2. Transport and storage (CNAE 49-53);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;45,66 3.2. Transport and storage (CNAE 49-53);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;42,5 3.2. Transport and storage (CNAE 49-53);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;50,03 3.2. Transport and storage (CNAE 49-53);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;75,18 3.2. Transport and storage (CNAE 49-53);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;38,23 3.2. Transport and storage (CNAE 49-53);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;35,29 3.2. Transport and storage (CNAE 49-53);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;44,05 3.2. Transport and storage (CNAE 49-53);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;60,35 3.2. Transport and storage (CNAE 49-53);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;25,83 3.2. Transport and storage (CNAE 49-53);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;22,6 3.2. Transport and storage (CNAE 49-53);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;33,86 3.2. Transport and storage (CNAE 49-53);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;75,83 3.2. Transport and storage (CNAE 49-53);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;65,49 3.2. Transport and storage (CNAE 49-53);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;62,1 3.2. Transport and storage (CNAE 49-53);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;72,74 3.2. Transport and storage (CNAE 49-53);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;78,05 3.2. Transport and storage (CNAE 49-53);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;24,66 3.2. Transport and storage (CNAE 49-53);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;27,56 3.2. Transport and storage (CNAE 49-53);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;17,85 3.2. Transport and storage (CNAE 49-53);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;15,01 3.2. Transport and storage (CNAE 49-53);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;9,85 3.2. Transport and storage (CNAE 49-53);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;10,34 3.2. Transport and storage (CNAE 49-53);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;9,4 3.2. Transport and storage (CNAE 49-53);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;6,94 3.2. Transport and storage (CNAE 49-53);H.5 % of enterprises that have experienced an ICT security incident (0);Total;13,13 3.2. Transport and storage (CNAE 49-53);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;11,12 3.2. Transport and storage (CNAE 49-53);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;20,52 3.2. Transport and storage (CNAE 49-53);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;34,2 3.2. Transport and storage (CNAE 49-53);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;74,18 3.2. Transport and storage (CNAE 49-53);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;73,95 3.2. Transport and storage (CNAE 49-53);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;73,03 3.2. Transport and storage (CNAE 49-53);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;78,9 3.2. Transport and storage (CNAE 49-53);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;19,41 3.2. Transport and storage (CNAE 49-53);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;18,05 3.2. Transport and storage (CNAE 49-53);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;21,63 3.2. Transport and storage (CNAE 49-53);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;25,21 3.2. Transport and storage (CNAE 49-53);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;17,18 3.2. Transport and storage (CNAE 49-53);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;15,16 3.2. Transport and storage (CNAE 49-53);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;22,12 3.2. Transport and storage (CNAE 49-53);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;21,78 3.2. Transport and storage (CNAE 49-53);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;23,27 3.2. Transport and storage (CNAE 49-53);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;28,84 3.2. Transport and storage (CNAE 49-53);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;9,44 3.2. Transport and storage (CNAE 49-53);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;11,09 3.2. Transport and storage (CNAE 49-53);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;10,56 3.2. Transport and storage (CNAE 49-53);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;9,94 3.2. Transport and storage (CNAE 49-53);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;11,55 3.2. Transport and storage (CNAE 49-53);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;13,24 3.2. Transport and storage (CNAE 49-53);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;4,66 3.2. Transport and storage (CNAE 49-53);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;4,6 3.2. Transport and storage (CNAE 49-53);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;4,5 3.2. Transport and storage (CNAE 49-53);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;5,56 3.3. Accommodation services (CNAE 55);H.1 % of enterprises that apply some ICT security measure (0);Total;94,98 3.3. Accommodation services (CNAE 55);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;94,84 3.3. Accommodation services (CNAE 55);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;94,45 3.3. Accommodation services (CNAE 55);H.1 % of enterprises that apply some ICT security measure (0);250 or more;100 3.3. Accommodation services (CNAE 55);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;94,9 3.3. Accommodation services (CNAE 55);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;93,98 3.3. Accommodation services (CNAE 55);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;96,87 3.3. Accommodation services (CNAE 55);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;99,35 3.3. Accommodation services (CNAE 55);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;25,4 3.3. Accommodation services (CNAE 55);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;18,21 3.3. Accommodation services (CNAE 55);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;42,28 3.3. Accommodation services (CNAE 55);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;53,61 3.3. Accommodation services (CNAE 55);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;33,99 3.3. Accommodation services (CNAE 55);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;24,84 3.3. Accommodation services (CNAE 55);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;53,23 3.3. Accommodation services (CNAE 55);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;80,91 3.3. Accommodation services (CNAE 55);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;39,12 3.3. Accommodation services (CNAE 55);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;30,43 3.3. Accommodation services (CNAE 55);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;57,63 3.3. Accommodation services (CNAE 55);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;82,48 3.3. Accommodation services (CNAE 55);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;92,63 3.3. Accommodation services (CNAE 55);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;91,27 3.3. Accommodation services (CNAE 55);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;95,84 3.3. Accommodation services (CNAE 55);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;97,77 3.3. Accommodation services (CNAE 55);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;70,07 3.3. Accommodation services (CNAE 55);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;62,86 3.3. Accommodation services (CNAE 55);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;86,98 3.3. Accommodation services (CNAE 55);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;98,47 3.3. Accommodation services (CNAE 55);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;52,1 3.3. Accommodation services (CNAE 55);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;42,88 3.3. Accommodation services (CNAE 55);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;72,35 3.3. Accommodation services (CNAE 55);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;95 3.3. Accommodation services (CNAE 55);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;40,16 3.3. Accommodation services (CNAE 55);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;30,91 3.3. Accommodation services (CNAE 55);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;60,24 3.3. Accommodation services (CNAE 55);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;84,32 3.3. Accommodation services (CNAE 55);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;35,8 3.3. Accommodation services (CNAE 55);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;25,4 3.3. Accommodation services (CNAE 55);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;56,93 3.3. Accommodation services (CNAE 55);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;92,74 3.3. Accommodation services (CNAE 55);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;32,86 3.3. Accommodation services (CNAE 55);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;25,28 3.3. Accommodation services (CNAE 55);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;47,85 3.3. Accommodation services (CNAE 55);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;76,33 3.3. Accommodation services (CNAE 55);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;40,34 3.3. Accommodation services (CNAE 55);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;33,64 3.3. Accommodation services (CNAE 55);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;53,01 3.3. Accommodation services (CNAE 55);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;81,69 3.3. Accommodation services (CNAE 55);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;69,92 3.3. Accommodation services (CNAE 55);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;66,65 3.3. Accommodation services (CNAE 55);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;75,2 3.3. Accommodation services (CNAE 55);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;94,6 3.3. Accommodation services (CNAE 55);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;76,23 3.3. Accommodation services (CNAE 55);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;74,65 3.3. Accommodation services (CNAE 55);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;76,88 3.3. Accommodation services (CNAE 55);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;91 3.3. Accommodation services (CNAE 55);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;49,89 3.3. Accommodation services (CNAE 55);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;46,74 3.3. Accommodation services (CNAE 55);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;53,86 3.3. Accommodation services (CNAE 55);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;68,74 3.3. Accommodation services (CNAE 55);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;40,65 3.3. Accommodation services (CNAE 55);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;31,55 3.3. Accommodation services (CNAE 55);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;57,73 3.3. Accommodation services (CNAE 55);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;73,14 3.3. Accommodation services (CNAE 55);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;40,89 3.3. Accommodation services (CNAE 55);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;34,02 3.3. Accommodation services (CNAE 55);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;55,33 3.3. Accommodation services (CNAE 55);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;77,79 3.3. Accommodation services (CNAE 55);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;72,5 3.3. Accommodation services (CNAE 55);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;66,45 3.3. Accommodation services (CNAE 55);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;81,36 3.3. Accommodation services (CNAE 55);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;82,81 3.3. Accommodation services (CNAE 55);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;20,32 3.3. Accommodation services (CNAE 55);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;27,12 3.3. Accommodation services (CNAE 55);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;8,78 3.3. Accommodation services (CNAE 55);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;14,5 3.3. Accommodation services (CNAE 55);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;7,18 3.3. Accommodation services (CNAE 55);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;6,42 3.3. Accommodation services (CNAE 55);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;9,86 3.3. Accommodation services (CNAE 55);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;2,69 3.3. Accommodation services (CNAE 55);H.5 % of enterprises that have experienced an ICT security incident (0);Total;22,86 3.3. Accommodation services (CNAE 55);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;19,74 3.3. Accommodation services (CNAE 55);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;29,16 3.3. Accommodation services (CNAE 55);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;41,1 3.3. Accommodation services (CNAE 55);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;68,98 3.3. Accommodation services (CNAE 55);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;58,99 3.3. Accommodation services (CNAE 55);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;85,68 3.3. Accommodation services (CNAE 55);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;85,51 3.3. Accommodation services (CNAE 55);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;30,78 3.3. Accommodation services (CNAE 55);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;30,47 3.3. Accommodation services (CNAE 55);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;32,43 3.3. Accommodation services (CNAE 55);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;27,17 3.3. Accommodation services (CNAE 55);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;24,47 3.3. Accommodation services (CNAE 55);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;23,66 3.3. Accommodation services (CNAE 55);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;25,58 3.3. Accommodation services (CNAE 55);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;26,78 3.3. Accommodation services (CNAE 55);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;20,78 3.3. Accommodation services (CNAE 55);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;23,78 3.3. Accommodation services (CNAE 55);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;14,37 3.3. Accommodation services (CNAE 55);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;21 3.3. Accommodation services (CNAE 55);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;9,56 3.3. Accommodation services (CNAE 55);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;6,53 3.3. Accommodation services (CNAE 55);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;15,25 3.3. Accommodation services (CNAE 55);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;12,27 3.3. Accommodation services (CNAE 55);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;7,59 3.3. Accommodation services (CNAE 55);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;6,65 3.3. Accommodation services (CNAE 55);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;7,92 3.3. Accommodation services (CNAE 55);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;13,71 3.4. Information and communications (CNAE 58-63);H.1 % of enterprises that apply some ICT security measure (0);Total;97,29 3.4. Information and communications (CNAE 58-63);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;96,65 3.4. Information and communications (CNAE 58-63);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;98,99 3.4. Information and communications (CNAE 58-63);H.1 % of enterprises that apply some ICT security measure (0);250 or more;100 3.4. Information and communications (CNAE 58-63);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;95,72 3.4. Information and communications (CNAE 58-63);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;94,33 3.4. Information and communications (CNAE 58-63);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;99,81 3.4. Information and communications (CNAE 58-63);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;99,67 3.4. Information and communications (CNAE 58-63);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;33,83 3.4. Information and communications (CNAE 58-63);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;28,17 3.4. Information and communications (CNAE 58-63);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;47,48 3.4. Information and communications (CNAE 58-63);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;62,09 3.4. Information and communications (CNAE 58-63);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;72,69 3.4. Information and communications (CNAE 58-63);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;68,17 3.4. Information and communications (CNAE 58-63);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;84,55 3.4. Information and communications (CNAE 58-63);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;91,34 3.4. Information and communications (CNAE 58-63);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;76,1 3.4. Information and communications (CNAE 58-63);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;72,31 3.4. Information and communications (CNAE 58-63);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;85,6 3.4. Information and communications (CNAE 58-63);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;93,52 3.4. Information and communications (CNAE 58-63);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;97,04 3.4. Information and communications (CNAE 58-63);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;96,72 3.4. Information and communications (CNAE 58-63);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;97,69 3.4. Information and communications (CNAE 58-63);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;99,13 3.4. Information and communications (CNAE 58-63);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;88,88 3.4. Information and communications (CNAE 58-63);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;86,57 3.4. Information and communications (CNAE 58-63);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;94,59 3.4. Information and communications (CNAE 58-63);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;99,67 3.4. Information and communications (CNAE 58-63);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;83,07 3.4. Information and communications (CNAE 58-63);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;80,14 3.4. Information and communications (CNAE 58-63);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;90,45 3.4. Information and communications (CNAE 58-63);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;96,42 3.4. Information and communications (CNAE 58-63);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;72,84 3.4. Information and communications (CNAE 58-63);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;68,57 3.4. Information and communications (CNAE 58-63);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;84,01 3.4. Information and communications (CNAE 58-63);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;90,51 3.4. Information and communications (CNAE 58-63);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;76,86 3.4. Information and communications (CNAE 58-63);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;72,74 3.4. Information and communications (CNAE 58-63);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;87,19 3.4. Information and communications (CNAE 58-63);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;95,72 3.4. Information and communications (CNAE 58-63);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;68,48 3.4. Information and communications (CNAE 58-63);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;62,5 3.4. Information and communications (CNAE 58-63);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;84,19 3.4. Information and communications (CNAE 58-63);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;92,94 3.4. Information and communications (CNAE 58-63);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;69,96 3.4. Information and communications (CNAE 58-63);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;65,23 3.4. Information and communications (CNAE 58-63);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;81,9 3.4. Information and communications (CNAE 58-63);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;91,27 3.4. Information and communications (CNAE 58-63);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;89,07 3.4. Information and communications (CNAE 58-63);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;87,06 3.4. Information and communications (CNAE 58-63);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;94,58 3.4. Information and communications (CNAE 58-63);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;96,25 3.4. Information and communications (CNAE 58-63);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;91,69 3.4. Information and communications (CNAE 58-63);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;89,92 3.4. Information and communications (CNAE 58-63);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;96,17 3.4. Information and communications (CNAE 58-63);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;97,41 3.4. Information and communications (CNAE 58-63);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;59,16 3.4. Information and communications (CNAE 58-63);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;52,66 3.4. Information and communications (CNAE 58-63);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;73,85 3.4. Information and communications (CNAE 58-63);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;87,45 3.4. Information and communications (CNAE 58-63);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;53,45 3.4. Information and communications (CNAE 58-63);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;50,04 3.4. Information and communications (CNAE 58-63);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;60,12 3.4. Information and communications (CNAE 58-63);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;72,36 3.4. Information and communications (CNAE 58-63);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;68,1 3.4. Information and communications (CNAE 58-63);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;62,99 3.4. Information and communications (CNAE 58-63);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;80,94 3.4. Information and communications (CNAE 58-63);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;93,36 3.4. Information and communications (CNAE 58-63);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;80,11 3.4. Information and communications (CNAE 58-63);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;77,68 3.4. Information and communications (CNAE 58-63);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;83,55 3.4. Information and communications (CNAE 58-63);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;92,96 3.4. Information and communications (CNAE 58-63);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;12,95 3.4. Information and communications (CNAE 58-63);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;13,9 3.4. Information and communications (CNAE 58-63);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;12,91 3.4. Information and communications (CNAE 58-63);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;3,25 3.4. Information and communications (CNAE 58-63);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;6,94 3.4. Information and communications (CNAE 58-63);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;8,42 3.4. Information and communications (CNAE 58-63);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;3,54 3.4. Information and communications (CNAE 58-63);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;3,79 3.4. Information and communications (CNAE 58-63);H.5 % of enterprises that have experienced an ICT security incident (0);Total;26,6 3.4. Information and communications (CNAE 58-63);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;23,33 3.4. Information and communications (CNAE 58-63);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;35,16 3.4. Information and communications (CNAE 58-63);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;41,36 3.4. Information and communications (CNAE 58-63);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;76,26 3.4. Information and communications (CNAE 58-63);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;74,19 3.4. Information and communications (CNAE 58-63);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;80,39 3.4. Information and communications (CNAE 58-63);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;79,72 3.4. Information and communications (CNAE 58-63);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;34,65 3.4. Information and communications (CNAE 58-63);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;36,1 3.4. Information and communications (CNAE 58-63);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;33,19 3.4. Information and communications (CNAE 58-63);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;27,23 3.4. Information and communications (CNAE 58-63);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;31,69 3.4. Information and communications (CNAE 58-63);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;37,68 3.4. Information and communications (CNAE 58-63);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;18,25 3.4. Information and communications (CNAE 58-63);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;26,98 3.4. Information and communications (CNAE 58-63);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;24,19 3.4. Information and communications (CNAE 58-63);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;29,4 3.4. Information and communications (CNAE 58-63);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;13,46 3.4. Information and communications (CNAE 58-63);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;16,65 3.4. Information and communications (CNAE 58-63);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;7,74 3.4. Information and communications (CNAE 58-63);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;9 3.4. Information and communications (CNAE 58-63);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;4,69 3.4. Information and communications (CNAE 58-63);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;7,53 3.4. Information and communications (CNAE 58-63);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;7,73 3.4. Information and communications (CNAE 58-63);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;6,39 3.4. Information and communications (CNAE 58-63);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;8,79 3.4. Information and communications (CNAE 58-63);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;15,63 3.5. Real estate activities (CNAE 68);H.1 % of enterprises that apply some ICT security measure (0);Total;95,6 3.5. Real estate activities (CNAE 68);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;95,15 3.5. Real estate activities (CNAE 68);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;100 3.5. Real estate activities (CNAE 68);H.1 % of enterprises that apply some ICT security measure (0);250 or more;100 3.5. Real estate activities (CNAE 68);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;98,73 3.5. Real estate activities (CNAE 68);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;98,6 3.5. Real estate activities (CNAE 68);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;100 3.5. Real estate activities (CNAE 68);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;100 3.5. Real estate activities (CNAE 68);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;34,59 3.5. Real estate activities (CNAE 68);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;34,11 3.5. Real estate activities (CNAE 68);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;33,43 3.5. Real estate activities (CNAE 68);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;67,29 3.5. Real estate activities (CNAE 68);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;44,71 3.5. Real estate activities (CNAE 68);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;41,89 3.5. Real estate activities (CNAE 68);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;65,12 3.5. Real estate activities (CNAE 68);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;100 3.5. Real estate activities (CNAE 68);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;56,95 3.5. Real estate activities (CNAE 68);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;54,03 3.5. Real estate activities (CNAE 68);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;80,88 3.5. Real estate activities (CNAE 68);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;100 3.5. Real estate activities (CNAE 68);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;94,65 3.5. Real estate activities (CNAE 68);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;94,07 3.5. Real estate activities (CNAE 68);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;100 3.5. Real estate activities (CNAE 68);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;100 3.5. Real estate activities (CNAE 68);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;71,62 3.5. Real estate activities (CNAE 68);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;69,19 3.5. Real estate activities (CNAE 68);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;93,01 3.5. Real estate activities (CNAE 68);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;100 3.5. Real estate activities (CNAE 68);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;55,01 3.5. Real estate activities (CNAE 68);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;50,94 3.5. Real estate activities (CNAE 68);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;92,55 3.5. Real estate activities (CNAE 68);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;93,24 3.5. Real estate activities (CNAE 68);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;55,88 3.5. Real estate activities (CNAE 68);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;52,63 3.5. Real estate activities (CNAE 68);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;87,5 3.5. Real estate activities (CNAE 68);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;78,46 3.5. Real estate activities (CNAE 68);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;54,33 3.5. Real estate activities (CNAE 68);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;50,86 3.5. Real estate activities (CNAE 68);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;83,77 3.5. Real estate activities (CNAE 68);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;100 3.5. Real estate activities (CNAE 68);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;35,98 3.5. Real estate activities (CNAE 68);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;31,69 3.5. Real estate activities (CNAE 68);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;73,48 3.5. Real estate activities (CNAE 68);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;87,28 3.5. Real estate activities (CNAE 68);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;38,23 3.5. Real estate activities (CNAE 68);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;33,63 3.5. Real estate activities (CNAE 68);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;78,3 3.5. Real estate activities (CNAE 68);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;94,03 3.5. Real estate activities (CNAE 68);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;67,34 3.5. Real estate activities (CNAE 68);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;65,51 3.5. Real estate activities (CNAE 68);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;81,27 3.5. Real estate activities (CNAE 68);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;100 3.5. Real estate activities (CNAE 68);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;82,43 3.5. Real estate activities (CNAE 68);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;81,71 3.5. Real estate activities (CNAE 68);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;87,17 3.5. Real estate activities (CNAE 68);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;89,2 3.5. Real estate activities (CNAE 68);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;53,51 3.5. Real estate activities (CNAE 68);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;50,77 3.5. Real estate activities (CNAE 68);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;71,08 3.5. Real estate activities (CNAE 68);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;82,08 3.5. Real estate activities (CNAE 68);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;24,67 3.5. Real estate activities (CNAE 68);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;22,71 3.5. Real estate activities (CNAE 68);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;33,91 3.5. Real estate activities (CNAE 68);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;59,02 3.5. Real estate activities (CNAE 68);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;33,89 3.5. Real estate activities (CNAE 68);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;29,65 3.5. Real estate activities (CNAE 68);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;70,26 3.5. Real estate activities (CNAE 68);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;100 3.5. Real estate activities (CNAE 68);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;76,06 3.5. Real estate activities (CNAE 68);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;77,22 3.5. Real estate activities (CNAE 68);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;68,01 3.5. Real estate activities (CNAE 68);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;84,43 3.5. Real estate activities (CNAE 68);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;9,41 3.5. Real estate activities (CNAE 68);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;6,38 3.5. Real estate activities (CNAE 68);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;23,7 3.5. Real estate activities (CNAE 68);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;11,53 3.5. Real estate activities (CNAE 68);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;14,53 3.5. Real estate activities (CNAE 68);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;16,4 3.5. Real estate activities (CNAE 68);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;8,28 3.5. Real estate activities (CNAE 68);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;4,04 3.5. Real estate activities (CNAE 68);H.5 % of enterprises that have experienced an ICT security incident (0);Total;13,15 3.5. Real estate activities (CNAE 68);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;11,64 3.5. Real estate activities (CNAE 68);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;29,22 3.5. Real estate activities (CNAE 68);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;20,72 3.5. Real estate activities (CNAE 68);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;60,68 3.5. Real estate activities (CNAE 68);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;56,9 3.5. Real estate activities (CNAE 68);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;78,75 3.5. Real estate activities (CNAE 68);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;56,82 3.5. Real estate activities (CNAE 68);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;19,13 3.5. Real estate activities (CNAE 68);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;19,6 3.5. Real estate activities (CNAE 68);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;19,59 3.5. Real estate activities (CNAE 68);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;0 3.5. Real estate activities (CNAE 68);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;24,45 3.5. Real estate activities (CNAE 68);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;29,89 3.5. Real estate activities (CNAE 68);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;2,61 3.5. Real estate activities (CNAE 68);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;0 3.5. Real estate activities (CNAE 68);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;14,84 3.5. Real estate activities (CNAE 68);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;15,69 3.5. Real estate activities (CNAE 68);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;12,93 3.5. Real estate activities (CNAE 68);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;0 3.5. Real estate activities (CNAE 68);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;12,09 3.5. Real estate activities (CNAE 68);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;8,32 3.5. Real estate activities (CNAE 68);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;25,27 3.5. Real estate activities (CNAE 68);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;43,18 3.5. Real estate activities (CNAE 68);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;2,34 3.5. Real estate activities (CNAE 68);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;0 3.5. Real estate activities (CNAE 68);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;7,51 3.5. Real estate activities (CNAE 68);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;43,18 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1 % of enterprises that apply some ICT security measure (0);Total;97,8 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;97,72 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;97,91 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1 % of enterprises that apply some ICT security measure (0);250 or more;99,42 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;93,79 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;92,79 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;98,21 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;99,66 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;22 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;18,14 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;38,73 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;46,03 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;46,95 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;41,27 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;70,39 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;87,11 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;54,9 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;49,64 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;77,04 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;90,51 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;95,64 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;95,32 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;96,72 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;98,9 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;84,69 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;82,17 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;96,45 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;96,66 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;71,41 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;67,39 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;88,98 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;95,85 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;58,19 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;53,94 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;74,98 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;91,52 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;58,06 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;52,93 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;79,44 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;93,5 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;46,14 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;40,61 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;68,91 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;85,54 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;51,28 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;45,45 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;75,86 3.6. Professional, scientific and technical activities (CNAE 69-75);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;90,45 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;75,12 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;71,62 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;89,79 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;99,01 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;86,51 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;84,95 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;92,54 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;91,02 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;49,77 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;44,09 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;67,63 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;82,17 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;46,25 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;41,89 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;61,78 3.6. Professional, scientific and technical activities (CNAE 69-75);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;63,97 3.6. Professional, scientific and technical activities (CNAE 69-75);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;48,72 3.6. Professional, scientific and technical activities (CNAE 69-75);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;42,83 3.6. Professional, scientific and technical activities (CNAE 69-75);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;73,22 3.6. Professional, scientific and technical activities (CNAE 69-75);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;90,48 3.6. Professional, scientific and technical activities (CNAE 69-75);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;76,29 3.6. Professional, scientific and technical activities (CNAE 69-75);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;73,54 3.6. Professional, scientific and technical activities (CNAE 69-75);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;83,52 3.6. Professional, scientific and technical activities (CNAE 69-75);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;83,75 3.6. Professional, scientific and technical activities (CNAE 69-75);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;14,18 3.6. Professional, scientific and technical activities (CNAE 69-75);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;15,24 3.6. Professional, scientific and technical activities (CNAE 69-75);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;11,74 3.6. Professional, scientific and technical activities (CNAE 69-75);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;10,07 3.6. Professional, scientific and technical activities (CNAE 69-75);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;9,53 3.6. Professional, scientific and technical activities (CNAE 69-75);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;11,22 3.6. Professional, scientific and technical activities (CNAE 69-75);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;4,74 3.6. Professional, scientific and technical activities (CNAE 69-75);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;6,17 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5 % of enterprises that have experienced an ICT security incident (0);Total;23,21 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;21,99 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;28,18 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;32,54 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;66,67 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;66,03 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;67,06 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;75,97 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;18,46 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;16,36 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;25,02 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;29,5 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;16,21 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;15,31 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;20,17 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;16,61 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;11,21 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;10,94 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;12,42 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;11,15 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;10,47 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;8,59 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;17,97 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;14,4 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;6,18 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;5,62 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;7,11 3.6. Professional, scientific and technical activities (CNAE 69-75);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;12,27 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1 % of enterprises that apply some ICT security measure (0);Total;80,23 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;76,85 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;88,65 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1 % of enterprises that apply some ICT security measure (0);250 or more;97,57 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;90,97 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;90,24 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;91,77 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;95,96 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;20,66 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;18,28 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;23,03 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;37,7 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;34,97 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;31,16 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;37,46 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;65,76 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;42,88 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;39,53 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;46,66 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;65,68 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;87,98 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;85,46 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;94,25 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;95,95 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;61,55 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;55,89 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;71,97 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;89,18 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;42,82 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;36,67 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;52,66 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;76,9 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;35,37 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;30,86 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;39,13 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;69,53 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;32,78 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;27,22 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;40,25 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;67,37 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;28,21 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;23,44 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;32,84 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;62,74 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;28,92 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;21,97 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;40,52 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;66,16 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;62,29 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;59,4 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;66,74 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;78,78 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;75,25 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;72,78 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;75,84 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;92,19 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;40,92 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;36,08 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;45,24 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;66,95 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;46,65 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;46,92 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;43,94 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;50,8 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;28,17 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;23,72 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;34,78 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;64,19 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;70,7 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;67,66 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;72,3 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;82,16 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;18,9 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;19,72 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;22,13 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;9,95 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;10,4 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;12,62 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;5,57 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;7,89 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5 % of enterprises that have experienced an ICT security incident (0);Total;13,43 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;11,48 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;16,6 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;28,32 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;70,31 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;72,42 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;63,95 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;70,62 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;28,87 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;33,97 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;21,07 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;16,55 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;34,65 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;35,29 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;44,79 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;13,85 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;17,99 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;19,28 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;20,21 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;7,65 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;12,77 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;13,72 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;4,72 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;21,89 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;10,85 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;11,83 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;11,12 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;5,48 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1 % of enterprises that apply some ICT security measure (0);Total;98,17 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1 % of enterprises that apply some ICT security measure (0);From 10 to 49;97,61 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1 % of enterprises that apply some ICT security measure (0);From 50 to 249;99,89 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1 % of enterprises that apply some ICT security measure (0);250 or more;100 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total;97,45 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 10 to 49;96,62 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);From 50 to 249;100 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);250 or more;99,64 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total;35,85 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 10 to 49;31,33 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);From 50 to 249;46,73 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);250 or more;61,24 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total;72,09 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 10 to 49;68,64 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);From 50 to 249;80,37 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);250 or more;91,63 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total;73,15 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 10 to 49;69,23 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);From 50 to 249;82,86 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);250 or more;94,04 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total;97,09 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 10 to 49;96,8 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);From 50 to 249;97,68 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);250 or more;99,06 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.F % of enterprises applying network access control as an ICT security measure (1);Total;88,47 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 10 to 49;86,07 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.F % of enterprises applying network access control as an ICT security measure (1);From 50 to 249;94,75 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.F % of enterprises applying network access control as an ICT security measure (1);250 or more;99,64 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.G % of enterprises applying VPN as an ICT security measure (1);Total;82,14 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 10 to 49;78,77 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.G % of enterprises applying VPN as an ICT security measure (1);From 50 to 249;91,14 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.G % of enterprises applying VPN as an ICT security measure (1);250 or more;97,12 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total;70,83 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 10 to 49;65,75 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);From 50 to 249;84,71 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);250 or more;92,04 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total;75,05 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 10 to 49;70,44 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);From 50 to 249;87,34 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);250 or more;95,74 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total;66,05 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 10 to 49;60,16 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);From 50 to 249;81,23 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);250 or more;94,76 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total;68,3 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 10 to 49;63,53 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);From 50 to 249;80,46 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);250 or more;92,13 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total;89,46 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 10 to 49;87,37 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);From 50 to 249;95,41 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2 % of enterprises that make their employees aware of their ICT security obligations (1);250 or more;97,17 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total;90,66 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 10 to 49;88,79 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);From 50 to 249;95,55 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);250 or more;96,87 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total;55,75 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 10 to 49;47,58 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);From 50 to 249;75,07 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);250 or more;91,34 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total;51,47 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 10 to 49;48,12 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);From 50 to 249;57,94 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);250 or more;72,43 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total;66,44 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 10 to 49;59,59 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);From 50 to 249;86,32 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);250 or more;92,57 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total;81,54 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 10 to 49;79,07 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);From 50 to 249;85,11 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);250 or more;93,25 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total;12,74 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 10 to 49;13,96 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);From 50 to 249;11,6 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);250 or more;4,36 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total;5,72 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 10 to 49;6,97 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);From 50 to 249;3,29 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);250 or more;2,39 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5 % of enterprises that have experienced an ICT security incident (0);Total;26,43 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5 % of enterprises that have experienced an ICT security incident (0);From 10 to 49;24,71 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5 % of enterprises that have experienced an ICT security incident (0);From 50 to 249;30,71 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5 % of enterprises that have experienced an ICT security incident (0);250 or more;36,05 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total;74,95 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 10 to 49;74,67 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);From 50 to 249;75,82 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);250 or more;74,91 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total;34,95 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 10 to 49;37,31 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);From 50 to 249;30,32 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);250 or more;25,32 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total;32,09 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 10 to 49;37,78 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);From 50 to 249;17,46 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);250 or more;22,28 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total;23,34 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 10 to 49;27,34 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);From 50 to 249;13,39 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);250 or more;15,2 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total;9,68 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 10 to 49;9,98 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);From 50 to 249;8,93 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);250 or more;9 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total;7,99 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 10 to 49;5,96 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);From 50 to 249;11,62 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951);H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);250 or more;17,57