Autonomous Communities and Cities;Main variables;Activity grouping;Total National total;H.1 % of enterprises that apply some ICT security measure (0);Total Enterprises;91,27 National total;H.1 % of enterprises that apply some ICT security measure (0);Industry;91,9 National total;H.1 % of enterprises that apply some ICT security measure (0);Construction;87,38 National total;H.1 % of enterprises that apply some ICT security measure (0);Services;92,08 National total;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total Enterprises;91,09 National total;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Industry;90,23 National total;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Construction;89,11 National total;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Services;91,99 National total;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total Enterprises;22,22 National total;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Industry;21,7 National total;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Construction;20,3 National total;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Services;22,96 National total;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total Enterprises;34,55 National total;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Industry;30,27 National total;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Construction;24,89 National total;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Services;39,01 National total;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total Enterprises;40,41 National total;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Industry;34,93 National total;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Construction;30,72 National total;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Services;45,42 National total;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total Enterprises;91,29 National total;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Industry;92,14 National total;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Construction;87 National total;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Services;92,04 National total;H.1.F % of enterprises applying network access control as an ICT security measure (1);Total Enterprises;69,59 National total;H.1.F % of enterprises applying network access control as an ICT security measure (1);Industry;70,15 National total;H.1.F % of enterprises applying network access control as an ICT security measure (1);Construction;54,1 National total;H.1.F % of enterprises applying network access control as an ICT security measure (1);Services;73,43 National total;H.1.G % of enterprises applying VPN as an ICT security measure (1);Total Enterprises;52,3 National total;H.1.G % of enterprises applying VPN as an ICT security measure (1);Industry;51,03 National total;H.1.G % of enterprises applying VPN as an ICT security measure (1);Construction;34,88 National total;H.1.G % of enterprises applying VPN as an ICT security measure (1);Services;57,46 National total;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total Enterprises;39,3 National total;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Industry;35,55 National total;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Construction;25,04 National total;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Services;44,73 National total;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total Enterprises;37,3 National total;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Industry;35,01 National total;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Construction;19,36 National total;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Services;43,06 National total;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total Enterprises;29,83 National total;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Industry;26,45 National total;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Construction;13,06 National total;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Services;35,76 National total;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total Enterprises;35,33 National total;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Industry;33,58 National total;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Construction;20,67 National total;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Services;39,98 National total;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total Enterprises;63,52 National total;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Industry;59,78 National total;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Construction;52,03 National total;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Services;68,22 National total;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total Enterprises;77,46 National total;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Industry;76,96 National total;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Construction;65,11 National total;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Services;80,15 National total;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total Enterprises;44,93 National total;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Industry;40,06 National total;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Construction;40,78 National total;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Services;47,67 National total;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total Enterprises;40,01 National total;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Industry;36,77 National total;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Construction;38,17 National total;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Services;41,65 National total;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total Enterprises;31,86 National total;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Industry;28,34 National total;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Construction;20,07 National total;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Services;36,71 National total;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total Enterprises;70,73 National total;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Industry;68,19 National total;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Construction;64,97 National total;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Services;72,48 National total;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total Enterprises;19,13 National total;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Industry;21,11 National total;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Construction;26,55 National total;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Services;17,32 National total;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total Enterprises;10,14 National total;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Industry;10,69 National total;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Construction;8,48 National total;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Services;10,2 National total;H.5 % of enterprises that have experienced an ICT security incident (0);Total Enterprises;16,19 National total;H.5 % of enterprises that have experienced an ICT security incident (0);Industry;16,04 National total;H.5 % of enterprises that have experienced an ICT security incident (0);Construction;12,85 National total;H.5 % of enterprises that have experienced an ICT security incident (0);Services;17,19 National total;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total Enterprises;74,6 National total;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Industry;79,56 National total;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Construction;74,03 National total;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Services;72,65 National total;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total Enterprises;19,95 National total;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Industry;14,1 National total;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Construction;14,74 National total;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Services;23,47 National total;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total Enterprises;22,08 National total;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Industry;22,98 National total;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Construction;22,34 National total;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Services;21,65 National total;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total Enterprises;16,19 National total;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Industry;12,32 National total;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Construction;21,77 National total;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Services;16,64 National total;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total Enterprises;8,38 National total;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Industry;7,89 National total;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Construction;7,86 National total;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Services;8,7 National total;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total Enterprises;5,33 National total;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Industry;3,13 National total;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Construction;6,35 National total;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Services;6,04 Andalucía;H.1 % of enterprises that apply some ICT security measure (0);Total Enterprises;88,99 Andalucía;H.1 % of enterprises that apply some ICT security measure (0);Industry;90,4 Andalucía;H.1 % of enterprises that apply some ICT security measure (0);Construction;85,09 Andalucía;H.1 % of enterprises that apply some ICT security measure (0);Services;89,85 Andalucía;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total Enterprises;91,53 Andalucía;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Industry;95,61 Andalucía;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Construction;88,67 Andalucía;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Services;90,83 Andalucía;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total Enterprises;20,25 Andalucía;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Industry;21,87 Andalucía;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Construction;19,9 Andalucía;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Services;19,69 Andalucía;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total Enterprises;26,62 Andalucía;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Industry;26,2 Andalucía;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Construction;19,57 Andalucía;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Services;29,29 Andalucía;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total Enterprises;37,59 Andalucía;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Industry;31,43 Andalucía;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Construction;34,81 Andalucía;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Services;41,14 Andalucía;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total Enterprises;88,49 Andalucía;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Industry;86,64 Andalucía;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Construction;83,98 Andalucía;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Services;90,85 Andalucía;H.1.F % of enterprises applying network access control as an ICT security measure (1);Total Enterprises;63,13 Andalucía;H.1.F % of enterprises applying network access control as an ICT security measure (1);Industry;62,46 Andalucía;H.1.F % of enterprises applying network access control as an ICT security measure (1);Construction;49,92 Andalucía;H.1.F % of enterprises applying network access control as an ICT security measure (1);Services;68,06 Andalucía;H.1.G % of enterprises applying VPN as an ICT security measure (1);Total Enterprises;42,88 Andalucía;H.1.G % of enterprises applying VPN as an ICT security measure (1);Industry;38,9 Andalucía;H.1.G % of enterprises applying VPN as an ICT security measure (1);Construction;29,99 Andalucía;H.1.G % of enterprises applying VPN as an ICT security measure (1);Services;49,09 Andalucía;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total Enterprises;32,33 Andalucía;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Industry;22,56 Andalucía;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Construction;22,72 Andalucía;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Services;39,79 Andalucía;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total Enterprises;31,38 Andalucía;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Industry;25,99 Andalucía;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Construction;20,82 Andalucía;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Services;37,35 Andalucía;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total Enterprises;23,35 Andalucía;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Industry;18,93 Andalucía;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Construction;11,11 Andalucía;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Services;29,51 Andalucía;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total Enterprises;28,88 Andalucía;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Industry;23,97 Andalucía;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Construction;22,62 Andalucía;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Services;33,13 Andalucía;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total Enterprises;68,1 Andalucía;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Industry;60,06 Andalucía;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Construction;62,87 Andalucía;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Services;73,3 Andalucía;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total Enterprises;73,92 Andalucía;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Industry;80,38 Andalucía;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Construction;49,58 Andalucía;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Services;79,06 Andalucía;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total Enterprises;41,44 Andalucía;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Industry;39,71 Andalucía;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Construction;56,74 Andalucía;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Services;37,4 Andalucía;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total Enterprises;38,38 Andalucía;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Industry;36,72 Andalucía;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Construction;45,3 Andalucía;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Services;36,86 Andalucía;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total Enterprises;29,21 Andalucía;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Industry;26,92 Andalucía;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Construction;24,95 Andalucía;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Services;31,75 Andalucía;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total Enterprises;76,88 Andalucía;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Industry;80,06 Andalucía;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Construction;69,23 Andalucía;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Services;78 Andalucía;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total Enterprises;15,41 Andalucía;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Industry;10,01 Andalucía;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Construction;27,17 Andalucía;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Services;13,88 Andalucía;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total Enterprises;7,71 Andalucía;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Industry;9,94 Andalucía;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Construction;3,6 Andalucía;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Services;8,12 Andalucía;H.5 % of enterprises that have experienced an ICT security incident (0);Total Enterprises;15,66 Andalucía;H.5 % of enterprises that have experienced an ICT security incident (0);Industry;22,04 Andalucía;H.5 % of enterprises that have experienced an ICT security incident (0);Construction;12,6 Andalucía;H.5 % of enterprises that have experienced an ICT security incident (0);Services;14,16 Andalucía;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total Enterprises;72,24 Andalucía;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Industry;78 Andalucía;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Construction;62,18 Andalucía;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Services;71,85 Andalucía;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total Enterprises;18,56 Andalucía;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Industry;7,8 Andalucía;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Construction;0 Andalucía;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Services;31,66 Andalucía;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total Enterprises;35,08 Andalucía;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Industry;44,56 Andalucía;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Construction;21,31 Andalucía;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Services;33,51 Andalucía;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total Enterprises;17,62 Andalucía;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Industry;9,08 Andalucía;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Construction;15,97 Andalucía;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Services;23,69 Andalucía;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total Enterprises;11,21 Andalucía;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Industry;8,45 Andalucía;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Construction;11,24 Andalucía;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Services;12,97 Andalucía;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total Enterprises;9,94 Andalucía;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Industry;7,9 Andalucía;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Construction;6,86 Andalucía;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Services;12,27 Aragón;H.1 % of enterprises that apply some ICT security measure (0);Total Enterprises;93,93 Aragón;H.1 % of enterprises that apply some ICT security measure (0);Industry;93,72 Aragón;H.1 % of enterprises that apply some ICT security measure (0);Construction;85,7 Aragón;H.1 % of enterprises that apply some ICT security measure (0);Services;96,3 Aragón;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total Enterprises;91,24 Aragón;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Industry;90,06 Aragón;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Construction;85,96 Aragón;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Services;93,22 Aragón;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total Enterprises;21,59 Aragón;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Industry;24,27 Aragón;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Construction;21,45 Aragón;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Services;20,01 Aragón;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total Enterprises;30,77 Aragón;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Industry;30,61 Aragón;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Construction;37,36 Aragón;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Services;29,26 Aragón;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total Enterprises;37,65 Aragón;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Industry;34,95 Aragón;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Construction;34,71 Aragón;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Services;39,98 Aragón;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total Enterprises;91,13 Aragón;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Industry;94,73 Aragón;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Construction;86,72 Aragón;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Services;90,03 Aragón;H.1.F % of enterprises applying network access control as an ICT security measure (1);Total Enterprises;70,78 Aragón;H.1.F % of enterprises applying network access control as an ICT security measure (1);Industry;73,06 Aragón;H.1.F % of enterprises applying network access control as an ICT security measure (1);Construction;52,15 Aragón;H.1.F % of enterprises applying network access control as an ICT security measure (1);Services;73,9 Aragón;H.1.G % of enterprises applying VPN as an ICT security measure (1);Total Enterprises;51,1 Aragón;H.1.G % of enterprises applying VPN as an ICT security measure (1);Industry;51,64 Aragón;H.1.G % of enterprises applying VPN as an ICT security measure (1);Construction;35,68 Aragón;H.1.G % of enterprises applying VPN as an ICT security measure (1);Services;54,49 Aragón;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total Enterprises;33,55 Aragón;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Industry;33,79 Aragón;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Construction;49,2 Aragón;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Services;29,62 Aragón;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total Enterprises;34,18 Aragón;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Industry;34,29 Aragón;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Construction;29,62 Aragón;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Services;35,21 Aragón;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total Enterprises;28,87 Aragón;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Industry;25,24 Aragón;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Construction;25,54 Aragón;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Services;31,85 Aragón;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total Enterprises;32,13 Aragón;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Industry;31,19 Aragón;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Construction;34,28 Aragón;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Services;32,18 Aragón;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total Enterprises;62,97 Aragón;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Industry;58,83 Aragón;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Construction;59,61 Aragón;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Services;66,27 Aragón;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total Enterprises;79,64 Aragón;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Industry;77,16 Aragón;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Construction;79,73 Aragón;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Services;80,93 Aragón;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total Enterprises;41,85 Aragón;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Industry;31,88 Aragón;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Construction;45,44 Aragón;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Services;46,39 Aragón;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total Enterprises;40,24 Aragón;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Industry;38,46 Aragón;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Construction;33,6 Aragón;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Services;42,64 Aragón;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total Enterprises;27,16 Aragón;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Industry;29,1 Aragón;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Construction;18 Aragón;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Services;28,44 Aragón;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total Enterprises;66,35 Aragón;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Industry;67,13 Aragón;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Construction;43,67 Aragón;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Services;69,75 Aragón;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total Enterprises;19,34 Aragón;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Industry;18,75 Aragón;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Construction;38,97 Aragón;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Services;16,34 Aragón;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total Enterprises;14,31 Aragón;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Industry;14,12 Aragón;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Construction;17,36 Aragón;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Services;13,91 Aragón;H.5 % of enterprises that have experienced an ICT security incident (0);Total Enterprises;15,74 Aragón;H.5 % of enterprises that have experienced an ICT security incident (0);Industry;16,59 Aragón;H.5 % of enterprises that have experienced an ICT security incident (0);Construction;13,24 Aragón;H.5 % of enterprises that have experienced an ICT security incident (0);Services;15,89 Aragón;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total Enterprises;86,26 Aragón;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Industry;93,89 Aragón;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Construction;100 Aragón;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Services;78,23 Aragón;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total Enterprises;15,26 Aragón;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Industry;5,63 Aragón;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Construction;17,2 Aragón;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Services;21,03 Aragón;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total Enterprises;21,05 Aragón;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Industry;23,42 Aragón;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Construction;17,2 Aragón;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Services;20,4 Aragón;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total Enterprises;14,81 Aragón;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Industry;13,13 Aragón;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Construction;17,2 Aragón;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Services;15,36 Aragón;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total Enterprises;6,15 Aragón;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Industry;5,6 Aragón;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Construction;17,2 Aragón;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Services;4 Aragón;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total Enterprises;2,48 Aragón;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Industry;0 Aragón;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Construction;17,2 Aragón;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Services;0,76 Asturias, Principado de;H.1 % of enterprises that apply some ICT security measure (0);Total Enterprises;88,82 Asturias, Principado de;H.1 % of enterprises that apply some ICT security measure (0);Industry;89,04 Asturias, Principado de;H.1 % of enterprises that apply some ICT security measure (0);Construction;84,34 Asturias, Principado de;H.1 % of enterprises that apply some ICT security measure (0);Services;90,02 Asturias, Principado de;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total Enterprises;89,27 Asturias, Principado de;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Industry;87,53 Asturias, Principado de;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Construction;90,66 Asturias, Principado de;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Services;89,77 Asturias, Principado de;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total Enterprises;12,23 Asturias, Principado de;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Industry;13,95 Asturias, Principado de;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Construction;6,13 Asturias, Principado de;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Services;13,03 Asturias, Principado de;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total Enterprises;22,87 Asturias, Principado de;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Industry;27,54 Asturias, Principado de;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Construction;10,12 Asturias, Principado de;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Services;24,02 Asturias, Principado de;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total Enterprises;31,3 Asturias, Principado de;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Industry;27,16 Asturias, Principado de;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Construction;22,2 Asturias, Principado de;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Services;35,9 Asturias, Principado de;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total Enterprises;89,3 Asturias, Principado de;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Industry;86,67 Asturias, Principado de;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Construction;90,3 Asturias, Principado de;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Services;90,35 Asturias, Principado de;H.1.F % of enterprises applying network access control as an ICT security measure (1);Total Enterprises;68,01 Asturias, Principado de;H.1.F % of enterprises applying network access control as an ICT security measure (1);Industry;69 Asturias, Principado de;H.1.F % of enterprises applying network access control as an ICT security measure (1);Construction;82,39 Asturias, Principado de;H.1.F % of enterprises applying network access control as an ICT security measure (1);Services;63,54 Asturias, Principado de;H.1.G % of enterprises applying VPN as an ICT security measure (1);Total Enterprises;40,81 Asturias, Principado de;H.1.G % of enterprises applying VPN as an ICT security measure (1);Industry;42,97 Asturias, Principado de;H.1.G % of enterprises applying VPN as an ICT security measure (1);Construction;35,75 Asturias, Principado de;H.1.G % of enterprises applying VPN as an ICT security measure (1);Services;41,11 Asturias, Principado de;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total Enterprises;26,38 Asturias, Principado de;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Industry;23,9 Asturias, Principado de;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Construction;13,52 Asturias, Principado de;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Services;31,18 Asturias, Principado de;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total Enterprises;27,63 Asturias, Principado de;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Industry;27,15 Asturias, Principado de;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Construction;17,99 Asturias, Principado de;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Services;30,53 Asturias, Principado de;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total Enterprises;22,76 Asturias, Principado de;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Industry;20,31 Asturias, Principado de;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Construction;19,46 Asturias, Principado de;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Services;24,91 Asturias, Principado de;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total Enterprises;25,76 Asturias, Principado de;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Industry;21,63 Asturias, Principado de;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Construction;25,41 Asturias, Principado de;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Services;27,95 Asturias, Principado de;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total Enterprises;51,62 Asturias, Principado de;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Industry;52,73 Asturias, Principado de;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Construction;50,87 Asturias, Principado de;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Services;51,26 Asturias, Principado de;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total Enterprises;74,91 Asturias, Principado de;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Industry;76,3 Asturias, Principado de;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Construction;64,92 Asturias, Principado de;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Services;76,92 Asturias, Principado de;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total Enterprises;34,55 Asturias, Principado de;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Industry;28,14 Asturias, Principado de;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Construction;13,14 Asturias, Principado de;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Services;43,74 Asturias, Principado de;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total Enterprises;43,53 Asturias, Principado de;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Industry;40,15 Asturias, Principado de;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Construction;43,92 Asturias, Principado de;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Services;45,19 Asturias, Principado de;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total Enterprises;26,97 Asturias, Principado de;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Industry;23,56 Asturias, Principado de;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Construction;30,14 Asturias, Principado de;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Services;27,78 Asturias, Principado de;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total Enterprises;66,65 Asturias, Principado de;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Industry;67,48 Asturias, Principado de;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Construction;62,83 Asturias, Principado de;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Services;67,51 Asturias, Principado de;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total Enterprises;19,86 Asturias, Principado de;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Industry;29,72 Asturias, Principado de;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Construction;4,26 Asturias, Principado de;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Services;20,56 Asturias, Principado de;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total Enterprises;13,49 Asturias, Principado de;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Industry;2,8 Asturias, Principado de;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Construction;32,9 Asturias, Principado de;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Services;11,93 Asturias, Principado de;H.5 % of enterprises that have experienced an ICT security incident (0);Total Enterprises;12,81 Asturias, Principado de;H.5 % of enterprises that have experienced an ICT security incident (0);Industry;16,09 Asturias, Principado de;H.5 % of enterprises that have experienced an ICT security incident (0);Construction;6,84 Asturias, Principado de;H.5 % of enterprises that have experienced an ICT security incident (0);Services;12,89 Asturias, Principado de;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total Enterprises;79,87 Asturias, Principado de;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Industry;71,52 Asturias, Principado de;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Construction;100 Asturias, Principado de;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Services;82,07 Asturias, Principado de;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total Enterprises;23,59 Asturias, Principado de;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Industry;0 Asturias, Principado de;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Construction;83,78 Asturias, Principado de;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Services;29,29 Asturias, Principado de;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total Enterprises;7,35 Asturias, Principado de;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Industry;5,18 Asturias, Principado de;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Construction;0 Asturias, Principado de;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Services;9,88 Asturias, Principado de;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total Enterprises;8,93 Asturias, Principado de;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Industry;10,6 Asturias, Principado de;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Construction;0 Asturias, Principado de;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Services;9,25 Asturias, Principado de;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total Enterprises;1,65 Asturias, Principado de;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Industry;3,57 Asturias, Principado de;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Construction;0 Asturias, Principado de;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Services;0,69 Asturias, Principado de;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total Enterprises;3,75 Asturias, Principado de;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Industry;10,54 Asturias, Principado de;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Construction;0 Asturias, Principado de;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Services;0 Balears, Illes;H.1 % of enterprises that apply some ICT security measure (0);Total Enterprises;88,53 Balears, Illes;H.1 % of enterprises that apply some ICT security measure (0);Industry;85,28 Balears, Illes;H.1 % of enterprises that apply some ICT security measure (0);Construction;81,59 Balears, Illes;H.1 % of enterprises that apply some ICT security measure (0);Services;92,46 Balears, Illes;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total Enterprises;91,34 Balears, Illes;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Industry;91,89 Balears, Illes;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Construction;90,03 Balears, Illes;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Services;91,73 Balears, Illes;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total Enterprises;20,41 Balears, Illes;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Industry;16,58 Balears, Illes;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Construction;12,36 Balears, Illes;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Services;24,49 Balears, Illes;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total Enterprises;29,81 Balears, Illes;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Industry;30,16 Balears, Illes;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Construction;12,79 Balears, Illes;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Services;36,54 Balears, Illes;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total Enterprises;36,34 Balears, Illes;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Industry;14,42 Balears, Illes;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Construction;35,9 Balears, Illes;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Services;41,43 Balears, Illes;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total Enterprises;90,32 Balears, Illes;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Industry;88,15 Balears, Illes;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Construction;92,95 Balears, Illes;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Services;89,76 Balears, Illes;H.1.F % of enterprises applying network access control as an ICT security measure (1);Total Enterprises;73 Balears, Illes;H.1.F % of enterprises applying network access control as an ICT security measure (1);Industry;67,65 Balears, Illes;H.1.F % of enterprises applying network access control as an ICT security measure (1);Construction;65,95 Balears, Illes;H.1.F % of enterprises applying network access control as an ICT security measure (1);Services;77,01 Balears, Illes;H.1.G % of enterprises applying VPN as an ICT security measure (1);Total Enterprises;43,87 Balears, Illes;H.1.G % of enterprises applying VPN as an ICT security measure (1);Industry;28,65 Balears, Illes;H.1.G % of enterprises applying VPN as an ICT security measure (1);Construction;31,29 Balears, Illes;H.1.G % of enterprises applying VPN as an ICT security measure (1);Services;52,31 Balears, Illes;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total Enterprises;32,1 Balears, Illes;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Industry;25,17 Balears, Illes;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Construction;19,91 Balears, Illes;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Services;38,52 Balears, Illes;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total Enterprises;34,48 Balears, Illes;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Industry;27,8 Balears, Illes;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Construction;22,95 Balears, Illes;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Services;40,6 Balears, Illes;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total Enterprises;25,68 Balears, Illes;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Industry;16,1 Balears, Illes;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Construction;19,6 Balears, Illes;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Services;30,26 Balears, Illes;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total Enterprises;29,5 Balears, Illes;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Industry;22,98 Balears, Illes;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Construction;23,44 Balears, Illes;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Services;33,39 Balears, Illes;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total Enterprises;62,4 Balears, Illes;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Industry;64,26 Balears, Illes;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Construction;52,26 Balears, Illes;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Services;66,03 Balears, Illes;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total Enterprises;75,19 Balears, Illes;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Industry;86,38 Balears, Illes;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Construction;81,84 Balears, Illes;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Services;70,64 Balears, Illes;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total Enterprises;35,58 Balears, Illes;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Industry;25,62 Balears, Illes;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Construction;6,65 Balears, Illes;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Services;46,92 Balears, Illes;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total Enterprises;37,62 Balears, Illes;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Industry;25,93 Balears, Illes;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Construction;22,62 Balears, Illes;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Services;44,92 Balears, Illes;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total Enterprises;29,76 Balears, Illes;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Industry;15,29 Balears, Illes;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Construction;15,59 Balears, Illes;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Services;39,71 Balears, Illes;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total Enterprises;73,89 Balears, Illes;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Industry;91,43 Balears, Illes;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Construction;97,12 Balears, Illes;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Services;68,11 Balears, Illes;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total Enterprises;17,73 Balears, Illes;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Industry;8,57 Balears, Illes;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Construction;2,88 Balears, Illes;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Services;21,23 Balears, Illes;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total Enterprises;8,38 Balears, Illes;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Industry;0 Balears, Illes;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Construction;0 Balears, Illes;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Services;10,66 Balears, Illes;H.5 % of enterprises that have experienced an ICT security incident (0);Total Enterprises;11,15 Balears, Illes;H.5 % of enterprises that have experienced an ICT security incident (0);Industry;5,34 Balears, Illes;H.5 % of enterprises that have experienced an ICT security incident (0);Construction;1,16 Balears, Illes;H.5 % of enterprises that have experienced an ICT security incident (0);Services;17,09 Balears, Illes;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total Enterprises;68,52 Balears, Illes;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Industry;79,74 Balears, Illes;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Construction;100 Balears, Illes;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Services;66,7 Balears, Illes;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total Enterprises;28,14 Balears, Illes;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Industry;13,67 Balears, Illes;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Construction;72,73 Balears, Illes;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Services;27,87 Balears, Illes;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total Enterprises;25,06 Balears, Illes;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Industry;50,44 Balears, Illes;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Construction;81,82 Balears, Illes;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Services;21,38 Balears, Illes;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total Enterprises;11,61 Balears, Illes;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Industry;13,67 Balears, Illes;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Construction;72,73 Balears, Illes;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Services;9,57 Balears, Illes;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total Enterprises;6,96 Balears, Illes;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Industry;0 Balears, Illes;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Construction;9,09 Balears, Illes;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Services;7,42 Balears, Illes;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total Enterprises;7,5 Balears, Illes;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Industry;25,76 Balears, Illes;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Construction;9,09 Balears, Illes;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Services;6,06 Canarias;H.1 % of enterprises that apply some ICT security measure (0);Total Enterprises;87,22 Canarias;H.1 % of enterprises that apply some ICT security measure (0);Industry;85,43 Canarias;H.1 % of enterprises that apply some ICT security measure (0);Construction;82,4 Canarias;H.1 % of enterprises that apply some ICT security measure (0);Services;88,92 Canarias;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total Enterprises;86,74 Canarias;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Industry;86,61 Canarias;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Construction;89,45 Canarias;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Services;86,04 Canarias;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total Enterprises;16,49 Canarias;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Industry;11,99 Canarias;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Construction;19,77 Canarias;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Services;16,38 Canarias;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total Enterprises;30,92 Canarias;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Industry;29,03 Canarias;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Construction;24,4 Canarias;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Services;32,99 Canarias;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total Enterprises;36,01 Canarias;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Industry;22,58 Canarias;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Construction;25,24 Canarias;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Services;41,18 Canarias;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total Enterprises;92,3 Canarias;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Industry;92,22 Canarias;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Construction;90,51 Canarias;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Services;92,79 Canarias;H.1.F % of enterprises applying network access control as an ICT security measure (1);Total Enterprises;63,52 Canarias;H.1.F % of enterprises applying network access control as an ICT security measure (1);Industry;61,11 Canarias;H.1.F % of enterprises applying network access control as an ICT security measure (1);Construction;39,06 Canarias;H.1.F % of enterprises applying network access control as an ICT security measure (1);Services;70,46 Canarias;H.1.G % of enterprises applying VPN as an ICT security measure (1);Total Enterprises;38,57 Canarias;H.1.G % of enterprises applying VPN as an ICT security measure (1);Industry;41,43 Canarias;H.1.G % of enterprises applying VPN as an ICT security measure (1);Construction;23,57 Canarias;H.1.G % of enterprises applying VPN as an ICT security measure (1);Services;42,09 Canarias;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total Enterprises;34,94 Canarias;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Industry;29,99 Canarias;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Construction;17,44 Canarias;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Services;40,45 Canarias;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total Enterprises;32,25 Canarias;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Industry;26,61 Canarias;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Construction;16,54 Canarias;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Services;37,4 Canarias;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total Enterprises;26,51 Canarias;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Industry;22,36 Canarias;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Construction;21,73 Canarias;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Services;28,49 Canarias;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total Enterprises;31,19 Canarias;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Industry;22,07 Canarias;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Construction;25,81 Canarias;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Services;34,18 Canarias;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total Enterprises;55,52 Canarias;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Industry;47,6 Canarias;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Construction;40,27 Canarias;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Services;60,94 Canarias;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total Enterprises;72,5 Canarias;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Industry;77,23 Canarias;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Construction;56,94 Canarias;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Services;74,62 Canarias;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total Enterprises;40,35 Canarias;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Industry;35,76 Canarias;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Construction;43,59 Canarias;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Services;40,39 Canarias;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total Enterprises;38,28 Canarias;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Industry;25,57 Canarias;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Construction;35,7 Canarias;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Services;40,42 Canarias;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total Enterprises;22,56 Canarias;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Industry;15,5 Canarias;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Construction;10,22 Canarias;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Services;27,37 Canarias;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total Enterprises;69,34 Canarias;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Industry;77,69 Canarias;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Construction;35,84 Canarias;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Services;72,11 Canarias;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total Enterprises;16,19 Canarias;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Industry;22,31 Canarias;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Construction;17,42 Canarias;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Services;15,45 Canarias;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total Enterprises;14,47 Canarias;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Industry;0 Canarias;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Construction;46,74 Canarias;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Services;12,44 Canarias;H.5 % of enterprises that have experienced an ICT security incident (0);Total Enterprises;11,79 Canarias;H.5 % of enterprises that have experienced an ICT security incident (0);Industry;6,22 Canarias;H.5 % of enterprises that have experienced an ICT security incident (0);Construction;9,78 Canarias;H.5 % of enterprises that have experienced an ICT security incident (0);Services;13,35 Canarias;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total Enterprises;66,31 Canarias;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Industry;66,36 Canarias;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Construction;67,22 Canarias;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Services;66,12 Canarias;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total Enterprises;24,52 Canarias;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Industry;24,16 Canarias;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Construction;1,72 Canarias;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Services;29,36 Canarias;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total Enterprises;30,67 Canarias;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Industry;42,34 Canarias;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Construction;32,78 Canarias;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Services;29,26 Canarias;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total Enterprises;25,67 Canarias;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Industry;24,16 Canarias;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Construction;47,28 Canarias;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Services;21,24 Canarias;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total Enterprises;4,06 Canarias;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Industry;12,84 Canarias;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Construction;0 Canarias;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Services;4,2 Canarias;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total Enterprises;4,75 Canarias;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Industry;0 Canarias;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Construction;0 Canarias;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Services;6,14 Cantabria;H.1 % of enterprises that apply some ICT security measure (0);Total Enterprises;94 Cantabria;H.1 % of enterprises that apply some ICT security measure (0);Industry;94,26 Cantabria;H.1 % of enterprises that apply some ICT security measure (0);Construction;91,74 Cantabria;H.1 % of enterprises that apply some ICT security measure (0);Services;94,52 Cantabria;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total Enterprises;91,53 Cantabria;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Industry;93,07 Cantabria;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Construction;93,11 Cantabria;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Services;90,09 Cantabria;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total Enterprises;15,55 Cantabria;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Industry;17,22 Cantabria;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Construction;18,54 Cantabria;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Services;13,6 Cantabria;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total Enterprises;26,48 Cantabria;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Industry;26,63 Cantabria;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Construction;26,73 Cantabria;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Services;26,3 Cantabria;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total Enterprises;33,73 Cantabria;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Industry;35,58 Cantabria;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Construction;40,56 Cantabria;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Services;30,51 Cantabria;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total Enterprises;89,79 Cantabria;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Industry;89,83 Cantabria;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Construction;89,64 Cantabria;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Services;89,81 Cantabria;H.1.F % of enterprises applying network access control as an ICT security measure (1);Total Enterprises;62,33 Cantabria;H.1.F % of enterprises applying network access control as an ICT security measure (1);Industry;64,98 Cantabria;H.1.F % of enterprises applying network access control as an ICT security measure (1);Construction;54,34 Cantabria;H.1.F % of enterprises applying network access control as an ICT security measure (1);Services;63,06 Cantabria;H.1.G % of enterprises applying VPN as an ICT security measure (1);Total Enterprises;46,38 Cantabria;H.1.G % of enterprises applying VPN as an ICT security measure (1);Industry;44,08 Cantabria;H.1.G % of enterprises applying VPN as an ICT security measure (1);Construction;38,45 Cantabria;H.1.G % of enterprises applying VPN as an ICT security measure (1);Services;50,2 Cantabria;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total Enterprises;29,97 Cantabria;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Industry;35,59 Cantabria;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Construction;33,12 Cantabria;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Services;25,48 Cantabria;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total Enterprises;29,44 Cantabria;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Industry;31,72 Cantabria;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Construction;16,39 Cantabria;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Services;31,91 Cantabria;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total Enterprises;20,54 Cantabria;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Industry;22,58 Cantabria;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Construction;13,23 Cantabria;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Services;21,45 Cantabria;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total Enterprises;28,54 Cantabria;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Industry;30,01 Cantabria;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Construction;34,7 Cantabria;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Services;25,78 Cantabria;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total Enterprises;54,39 Cantabria;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Industry;55,29 Cantabria;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Construction;59,89 Cantabria;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Services;52,17 Cantabria;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total Enterprises;77,56 Cantabria;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Industry;75,29 Cantabria;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Construction;87,62 Cantabria;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Services;75,62 Cantabria;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total Enterprises;43,61 Cantabria;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Industry;36,09 Cantabria;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Construction;33,59 Cantabria;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Services;52,08 Cantabria;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total Enterprises;33,45 Cantabria;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Industry;38,5 Cantabria;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Construction;7,9 Cantabria;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Services;38,88 Cantabria;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total Enterprises;26,48 Cantabria;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Industry;19,86 Cantabria;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Construction;27,7 Cantabria;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Services;30,29 Cantabria;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total Enterprises;68,99 Cantabria;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Industry;68,73 Cantabria;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Construction;56,96 Cantabria;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Services;72,5 Cantabria;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total Enterprises;22,31 Cantabria;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Industry;25,03 Cantabria;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Construction;43,04 Cantabria;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Services;15,33 Cantabria;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total Enterprises;8,7 Cantabria;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Industry;6,25 Cantabria;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Construction;0 Cantabria;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Services;12,17 Cantabria;H.5 % of enterprises that have experienced an ICT security incident (0);Total Enterprises;18,32 Cantabria;H.5 % of enterprises that have experienced an ICT security incident (0);Industry;15,72 Cantabria;H.5 % of enterprises that have experienced an ICT security incident (0);Construction;18,25 Cantabria;H.5 % of enterprises that have experienced an ICT security incident (0);Services;19,98 Cantabria;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total Enterprises;69,73 Cantabria;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Industry;80,12 Cantabria;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Construction;30,57 Cantabria;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Services;75,6 Cantabria;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total Enterprises;26,68 Cantabria;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Industry;37,41 Cantabria;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Construction;52,11 Cantabria;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Services;14,17 Cantabria;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total Enterprises;16,28 Cantabria;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Industry;16,13 Cantabria;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Construction;0 Cantabria;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Services;20,95 Cantabria;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total Enterprises;15,62 Cantabria;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Industry;8,22 Cantabria;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Construction;69,43 Cantabria;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Services;4,11 Cantabria;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total Enterprises;9,56 Cantabria;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Industry;4,51 Cantabria;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Construction;0 Cantabria;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Services;14,77 Cantabria;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total Enterprises;2,24 Cantabria;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Industry;3,51 Cantabria;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Construction;0 Cantabria;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Services;2,24 Castilla y León;H.1 % of enterprises that apply some ICT security measure (0);Total Enterprises;91,39 Castilla y León;H.1 % of enterprises that apply some ICT security measure (0);Industry;91,44 Castilla y León;H.1 % of enterprises that apply some ICT security measure (0);Construction;89,04 Castilla y León;H.1 % of enterprises that apply some ICT security measure (0);Services;92,07 Castilla y León;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total Enterprises;85,64 Castilla y León;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Industry;88,04 Castilla y León;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Construction;83,88 Castilla y León;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Services;84,79 Castilla y León;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total Enterprises;18,22 Castilla y León;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Industry;21,42 Castilla y León;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Construction;23,49 Castilla y León;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Services;14,85 Castilla y León;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total Enterprises;27,92 Castilla y León;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Industry;24,29 Castilla y León;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Construction;25,6 Castilla y León;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Services;30,66 Castilla y León;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total Enterprises;35,84 Castilla y León;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Industry;37,2 Castilla y León;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Construction;39,66 Castilla y León;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Services;33,95 Castilla y León;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total Enterprises;94,26 Castilla y León;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Industry;96,03 Castilla y León;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Construction;91,48 Castilla y León;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Services;94,07 Castilla y León;H.1.F % of enterprises applying network access control as an ICT security measure (1);Total Enterprises;60 Castilla y León;H.1.F % of enterprises applying network access control as an ICT security measure (1);Industry;61,01 Castilla y León;H.1.F % of enterprises applying network access control as an ICT security measure (1);Construction;40,08 Castilla y León;H.1.F % of enterprises applying network access control as an ICT security measure (1);Services;65,25 Castilla y León;H.1.G % of enterprises applying VPN as an ICT security measure (1);Total Enterprises;51,17 Castilla y León;H.1.G % of enterprises applying VPN as an ICT security measure (1);Industry;47,49 Castilla y León;H.1.G % of enterprises applying VPN as an ICT security measure (1);Construction;40,33 Castilla y León;H.1.G % of enterprises applying VPN as an ICT security measure (1);Services;56,44 Castilla y León;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total Enterprises;34,8 Castilla y León;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Industry;36,9 Castilla y León;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Construction;24,88 Castilla y León;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Services;36,51 Castilla y León;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total Enterprises;29,92 Castilla y León;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Industry;34,23 Castilla y León;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Construction;13,2 Castilla y León;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Services;32,36 Castilla y León;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total Enterprises;23,27 Castilla y León;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Industry;24,85 Castilla y León;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Construction;13,7 Castilla y León;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Services;25,17 Castilla y León;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total Enterprises;32,2 Castilla y León;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Industry;33,38 Castilla y León;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Construction;32,64 Castilla y León;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Services;31,4 Castilla y León;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total Enterprises;55,51 Castilla y León;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Industry;61,27 Castilla y León;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Construction;44,86 Castilla y León;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Services;55,36 Castilla y León;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total Enterprises;75,85 Castilla y León;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Industry;77,36 Castilla y León;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Construction;63,16 Castilla y León;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Services;77,91 Castilla y León;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total Enterprises;38,13 Castilla y León;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Industry;36,89 Castilla y León;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Construction;37,69 Castilla y León;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Services;39,02 Castilla y León;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total Enterprises;37,41 Castilla y León;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Industry;24,3 Castilla y León;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Construction;43,27 Castilla y León;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Services;44,29 Castilla y León;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total Enterprises;25,69 Castilla y León;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Industry;23,81 Castilla y León;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Construction;22,07 Castilla y León;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Services;27,87 Castilla y León;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total Enterprises;64,15 Castilla y León;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Industry;71,73 Castilla y León;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Construction;57,59 Castilla y León;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Services;62 Castilla y León;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total Enterprises;29,76 Castilla y León;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Industry;23,14 Castilla y León;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Construction;41,83 Castilla y León;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Services;30,1 Castilla y León;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total Enterprises;6,1 Castilla y León;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Industry;5,12 Castilla y León;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Construction;0,58 Castilla y León;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Services;7,9 Castilla y León;H.5 % of enterprises that have experienced an ICT security incident (0);Total Enterprises;15,47 Castilla y León;H.5 % of enterprises that have experienced an ICT security incident (0);Industry;18,85 Castilla y León;H.5 % of enterprises that have experienced an ICT security incident (0);Construction;17,41 Castilla y León;H.5 % of enterprises that have experienced an ICT security incident (0);Services;12,94 Castilla y León;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total Enterprises;74,63 Castilla y León;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Industry;80,44 Castilla y León;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Construction;81,67 Castilla y León;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Services;66,92 Castilla y León;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total Enterprises;20,8 Castilla y León;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Industry;20,65 Castilla y León;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Construction;15,39 Castilla y León;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Services;23,13 Castilla y León;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total Enterprises;22,82 Castilla y León;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Industry;25,36 Castilla y León;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Construction;18,69 Castilla y León;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Services;22,38 Castilla y León;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total Enterprises;20,34 Castilla y León;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Industry;17,92 Castilla y León;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Construction;18,33 Castilla y León;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Services;23,19 Castilla y León;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total Enterprises;13,34 Castilla y León;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Industry;15,07 Castilla y León;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Construction;15,39 Castilla y León;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Services;11,05 Castilla y León;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total Enterprises;3 Castilla y León;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Industry;1,1 Castilla y León;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Construction;0 Castilla y León;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Services;5,8 Castilla-La Mancha;H.1 % of enterprises that apply some ICT security measure (0);Total Enterprises;88,32 Castilla-La Mancha;H.1 % of enterprises that apply some ICT security measure (0);Industry;90,85 Castilla-La Mancha;H.1 % of enterprises that apply some ICT security measure (0);Construction;84,13 Castilla-La Mancha;H.1 % of enterprises that apply some ICT security measure (0);Services;88,17 Castilla-La Mancha;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total Enterprises;87,72 Castilla-La Mancha;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Industry;85,48 Castilla-La Mancha;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Construction;90,26 Castilla-La Mancha;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Services;88,45 Castilla-La Mancha;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total Enterprises;20,88 Castilla-La Mancha;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Industry;24,81 Castilla-La Mancha;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Construction;9,82 Castilla-La Mancha;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Services;22,29 Castilla-La Mancha;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total Enterprises;27,81 Castilla-La Mancha;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Industry;26,39 Castilla-La Mancha;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Construction;18,41 Castilla-La Mancha;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Services;32,76 Castilla-La Mancha;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total Enterprises;29,68 Castilla-La Mancha;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Industry;31,53 Castilla-La Mancha;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Construction;11,76 Castilla-La Mancha;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Services;35,53 Castilla-La Mancha;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total Enterprises;87,34 Castilla-La Mancha;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Industry;84,38 Castilla-La Mancha;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Construction;88,62 Castilla-La Mancha;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Services;89,15 Castilla-La Mancha;H.1.F % of enterprises applying network access control as an ICT security measure (1);Total Enterprises;61,55 Castilla-La Mancha;H.1.F % of enterprises applying network access control as an ICT security measure (1);Industry;69,81 Castilla-La Mancha;H.1.F % of enterprises applying network access control as an ICT security measure (1);Construction;38,68 Castilla-La Mancha;H.1.F % of enterprises applying network access control as an ICT security measure (1);Services;64,36 Castilla-La Mancha;H.1.G % of enterprises applying VPN as an ICT security measure (1);Total Enterprises;37,54 Castilla-La Mancha;H.1.G % of enterprises applying VPN as an ICT security measure (1);Industry;41,1 Castilla-La Mancha;H.1.G % of enterprises applying VPN as an ICT security measure (1);Construction;19,39 Castilla-La Mancha;H.1.G % of enterprises applying VPN as an ICT security measure (1);Services;42,14 Castilla-La Mancha;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total Enterprises;25,91 Castilla-La Mancha;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Industry;29,82 Castilla-La Mancha;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Construction;2,48 Castilla-La Mancha;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Services;32,37 Castilla-La Mancha;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total Enterprises;26,02 Castilla-La Mancha;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Industry;31,4 Castilla-La Mancha;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Construction;4,69 Castilla-La Mancha;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Services;30,46 Castilla-La Mancha;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total Enterprises;20,79 Castilla-La Mancha;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Industry;24,43 Castilla-La Mancha;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Construction;4,74 Castilla-La Mancha;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Services;24,46 Castilla-La Mancha;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total Enterprises;27,59 Castilla-La Mancha;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Industry;31,23 Castilla-La Mancha;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Construction;10,27 Castilla-La Mancha;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Services;31,77 Castilla-La Mancha;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total Enterprises;56,52 Castilla-La Mancha;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Industry;61,33 Castilla-La Mancha;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Construction;37,36 Castilla-La Mancha;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Services;60,54 Castilla-La Mancha;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total Enterprises;75,16 Castilla-La Mancha;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Industry;80,43 Castilla-La Mancha;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Construction;73,57 Castilla-La Mancha;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Services;71,36 Castilla-La Mancha;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total Enterprises;42,29 Castilla-La Mancha;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Industry;32,94 Castilla-La Mancha;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Construction;46,54 Castilla-La Mancha;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Services;48,69 Castilla-La Mancha;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total Enterprises;38,62 Castilla-La Mancha;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Industry;37,04 Castilla-La Mancha;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Construction;40,86 Castilla-La Mancha;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Services;39,32 Castilla-La Mancha;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total Enterprises;25,24 Castilla-La Mancha;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Industry;25,29 Castilla-La Mancha;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Construction;13,87 Castilla-La Mancha;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Services;30,06 Castilla-La Mancha;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total Enterprises;65,96 Castilla-La Mancha;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Industry;78,68 Castilla-La Mancha;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Construction;76,92 Castilla-La Mancha;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Services;55,6 Castilla-La Mancha;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total Enterprises;21,21 Castilla-La Mancha;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Industry;15,91 Castilla-La Mancha;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Construction;0 Castilla-La Mancha;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Services;28,81 Castilla-La Mancha;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total Enterprises;12,83 Castilla-La Mancha;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Industry;5,41 Castilla-La Mancha;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Construction;23,08 Castilla-La Mancha;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Services;15,58 Castilla-La Mancha;H.5 % of enterprises that have experienced an ICT security incident (0);Total Enterprises;9,31 Castilla-La Mancha;H.5 % of enterprises that have experienced an ICT security incident (0);Industry;10,19 Castilla-La Mancha;H.5 % of enterprises that have experienced an ICT security incident (0);Construction;2,36 Castilla-La Mancha;H.5 % of enterprises that have experienced an ICT security incident (0);Services;11,61 Castilla-La Mancha;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total Enterprises;77,39 Castilla-La Mancha;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Industry;85,76 Castilla-La Mancha;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Construction;95,11 Castilla-La Mancha;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Services;70,22 Castilla-La Mancha;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total Enterprises;22,54 Castilla-La Mancha;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Industry;21,2 Castilla-La Mancha;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Construction;0 Castilla-La Mancha;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Services;25,39 Castilla-La Mancha;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total Enterprises;26,45 Castilla-La Mancha;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Industry;30,66 Castilla-La Mancha;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Construction;78,19 Castilla-La Mancha;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Services;19,13 Castilla-La Mancha;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total Enterprises;19,91 Castilla-La Mancha;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Industry;15,63 Castilla-La Mancha;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Construction;4,89 Castilla-La Mancha;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Services;24,09 Castilla-La Mancha;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total Enterprises;4,09 Castilla-La Mancha;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Industry;0 Castilla-La Mancha;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Construction;0 Castilla-La Mancha;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Services;7,19 Castilla-La Mancha;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total Enterprises;6,25 Castilla-La Mancha;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Industry;0 Castilla-La Mancha;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Construction;0 Castilla-La Mancha;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Services;10,99 Cataluña;H.1 % of enterprises that apply some ICT security measure (0);Total Enterprises;95,84 Cataluña;H.1 % of enterprises that apply some ICT security measure (0);Industry;94,65 Cataluña;H.1 % of enterprises that apply some ICT security measure (0);Construction;94,89 Cataluña;H.1 % of enterprises that apply some ICT security measure (0);Services;96,54 Cataluña;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total Enterprises;92,18 Cataluña;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Industry;92,05 Cataluña;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Construction;88,58 Cataluña;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Services;92,94 Cataluña;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total Enterprises;24,52 Cataluña;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Industry;20,2 Cataluña;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Construction;27,91 Cataluña;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Services;25,7 Cataluña;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total Enterprises;40,96 Cataluña;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Industry;32,3 Cataluña;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Construction;32,33 Cataluña;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Services;46,35 Cataluña;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total Enterprises;45,63 Cataluña;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Industry;40,35 Cataluña;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Construction;30,08 Cataluña;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Services;50,92 Cataluña;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total Enterprises;92,93 Cataluña;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Industry;95,51 Cataluña;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Construction;85,05 Cataluña;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Services;93,37 Cataluña;H.1.F % of enterprises applying network access control as an ICT security measure (1);Total Enterprises;77 Cataluña;H.1.F % of enterprises applying network access control as an ICT security measure (1);Industry;77,34 Cataluña;H.1.F % of enterprises applying network access control as an ICT security measure (1);Construction;65,53 Cataluña;H.1.F % of enterprises applying network access control as an ICT security measure (1);Services;79,1 Cataluña;H.1.G % of enterprises applying VPN as an ICT security measure (1);Total Enterprises;61,71 Cataluña;H.1.G % of enterprises applying VPN as an ICT security measure (1);Industry;63,11 Cataluña;H.1.G % of enterprises applying VPN as an ICT security measure (1);Construction;39,11 Cataluña;H.1.G % of enterprises applying VPN as an ICT security measure (1);Services;65,54 Cataluña;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total Enterprises;47,27 Cataluña;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Industry;42,17 Cataluña;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Construction;30,05 Cataluña;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Services;52,81 Cataluña;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total Enterprises;44,7 Cataluña;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Industry;42,47 Cataluña;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Construction;28,72 Cataluña;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Services;48,78 Cataluña;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total Enterprises;36 Cataluña;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Industry;31,85 Cataluña;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Construction;15,88 Cataluña;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Services;41,71 Cataluña;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total Enterprises;42,51 Cataluña;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Industry;39,82 Cataluña;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Construction;26,7 Cataluña;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Services;46,76 Cataluña;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total Enterprises;67,58 Cataluña;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Industry;65,22 Cataluña;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Construction;53,01 Cataluña;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Services;71,44 Cataluña;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total Enterprises;79,73 Cataluña;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Industry;77,27 Cataluña;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Construction;68,56 Cataluña;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Services;82,31 Cataluña;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total Enterprises;49,85 Cataluña;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Industry;41,37 Cataluña;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Construction;45 Cataluña;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Services;53,86 Cataluña;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total Enterprises;41,19 Cataluña;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Industry;39,05 Cataluña;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Construction;46,62 Cataluña;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Services;41,24 Cataluña;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total Enterprises;39,94 Cataluña;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Industry;35,16 Cataluña;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Construction;25,91 Cataluña;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Services;44,81 Cataluña;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total Enterprises;69,15 Cataluña;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Industry;59,57 Cataluña;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Construction;69,66 Cataluña;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Services;72,36 Cataluña;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total Enterprises;19,94 Cataluña;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Industry;28,5 Cataluña;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Construction;24,71 Cataluña;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Services;16,48 Cataluña;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total Enterprises;10,9 Cataluña;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Industry;11,92 Cataluña;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Construction;5,63 Cataluña;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Services;11,16 Cataluña;H.5 % of enterprises that have experienced an ICT security incident (0);Total Enterprises;20,32 Cataluña;H.5 % of enterprises that have experienced an ICT security incident (0);Industry;21 Cataluña;H.5 % of enterprises that have experienced an ICT security incident (0);Construction;13,84 Cataluña;H.5 % of enterprises that have experienced an ICT security incident (0);Services;21,31 Cataluña;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total Enterprises;79,35 Cataluña;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Industry;85,49 Cataluña;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Construction;82,78 Cataluña;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Services;76,28 Cataluña;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total Enterprises;17,46 Cataluña;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Industry;14,84 Cataluña;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Construction;7,05 Cataluña;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Services;19,94 Cataluña;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total Enterprises;14,98 Cataluña;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Industry;13,92 Cataluña;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Construction;22,96 Cataluña;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Services;14,41 Cataluña;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total Enterprises;13,19 Cataluña;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Industry;9,23 Cataluña;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Construction;14,15 Cataluña;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Services;14,77 Cataluña;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total Enterprises;7,49 Cataluña;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Industry;5,53 Cataluña;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Construction;2,94 Cataluña;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Services;8,92 Cataluña;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total Enterprises;4,03 Cataluña;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Industry;0 Cataluña;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Construction;19,93 Cataluña;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Services;3,69 Comunitat Valenciana;H.1 % of enterprises that apply some ICT security measure (0);Total Enterprises;91,91 Comunitat Valenciana;H.1 % of enterprises that apply some ICT security measure (0);Industry;92,27 Comunitat Valenciana;H.1 % of enterprises that apply some ICT security measure (0);Construction;85,95 Comunitat Valenciana;H.1 % of enterprises that apply some ICT security measure (0);Services;93,55 Comunitat Valenciana;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total Enterprises;90,56 Comunitat Valenciana;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Industry;88,87 Comunitat Valenciana;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Construction;86,65 Comunitat Valenciana;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Services;92,82 Comunitat Valenciana;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total Enterprises;20,06 Comunitat Valenciana;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Industry;20,03 Comunitat Valenciana;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Construction;21,36 Comunitat Valenciana;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Services;19,71 Comunitat Valenciana;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total Enterprises;33,55 Comunitat Valenciana;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Industry;29,7 Comunitat Valenciana;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Construction;32,98 Comunitat Valenciana;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Services;36,29 Comunitat Valenciana;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total Enterprises;34,77 Comunitat Valenciana;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Industry;28,82 Comunitat Valenciana;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Construction;27,99 Comunitat Valenciana;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Services;40,71 Comunitat Valenciana;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total Enterprises;89,57 Comunitat Valenciana;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Industry;90,82 Comunitat Valenciana;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Construction;90,83 Comunitat Valenciana;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Services;88,37 Comunitat Valenciana;H.1.F % of enterprises applying network access control as an ICT security measure (1);Total Enterprises;64,57 Comunitat Valenciana;H.1.F % of enterprises applying network access control as an ICT security measure (1);Industry;69,04 Comunitat Valenciana;H.1.F % of enterprises applying network access control as an ICT security measure (1);Construction;47,15 Comunitat Valenciana;H.1.F % of enterprises applying network access control as an ICT security measure (1);Services;66,65 Comunitat Valenciana;H.1.G % of enterprises applying VPN as an ICT security measure (1);Total Enterprises;47,16 Comunitat Valenciana;H.1.G % of enterprises applying VPN as an ICT security measure (1);Industry;44,04 Comunitat Valenciana;H.1.G % of enterprises applying VPN as an ICT security measure (1);Construction;32,72 Comunitat Valenciana;H.1.G % of enterprises applying VPN as an ICT security measure (1);Services;53,43 Comunitat Valenciana;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total Enterprises;35,2 Comunitat Valenciana;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Industry;33,79 Comunitat Valenciana;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Construction;26,55 Comunitat Valenciana;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Services;38,65 Comunitat Valenciana;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total Enterprises;30,31 Comunitat Valenciana;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Industry;29,8 Comunitat Valenciana;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Construction;18,02 Comunitat Valenciana;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Services;34,22 Comunitat Valenciana;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total Enterprises;23,89 Comunitat Valenciana;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Industry;21,47 Comunitat Valenciana;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Construction;6,2 Comunitat Valenciana;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Services;30,65 Comunitat Valenciana;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total Enterprises;28,63 Comunitat Valenciana;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Industry;28,11 Comunitat Valenciana;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Construction;13,37 Comunitat Valenciana;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Services;33,41 Comunitat Valenciana;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total Enterprises;59,99 Comunitat Valenciana;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Industry;55,97 Comunitat Valenciana;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Construction;52,43 Comunitat Valenciana;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Services;64,86 Comunitat Valenciana;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total Enterprises;74,44 Comunitat Valenciana;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Industry;72,95 Comunitat Valenciana;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Construction;59,82 Comunitat Valenciana;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Services;78,72 Comunitat Valenciana;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total Enterprises;39,05 Comunitat Valenciana;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Industry;37,91 Comunitat Valenciana;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Construction;34,92 Comunitat Valenciana;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Services;40,68 Comunitat Valenciana;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total Enterprises;39,26 Comunitat Valenciana;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Industry;46,38 Comunitat Valenciana;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Construction;31,16 Comunitat Valenciana;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Services;37,06 Comunitat Valenciana;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total Enterprises;29,11 Comunitat Valenciana;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Industry;28,53 Comunitat Valenciana;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Construction;22,03 Comunitat Valenciana;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Services;31,75 Comunitat Valenciana;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total Enterprises;64,26 Comunitat Valenciana;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Industry;61,91 Comunitat Valenciana;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Construction;59,25 Comunitat Valenciana;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Services;66,79 Comunitat Valenciana;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total Enterprises;24,45 Comunitat Valenciana;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Industry;20,83 Comunitat Valenciana;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Construction;40,75 Comunitat Valenciana;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Services;23,07 Comunitat Valenciana;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total Enterprises;11,29 Comunitat Valenciana;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Industry;17,26 Comunitat Valenciana;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Construction;0 Comunitat Valenciana;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Services;10,14 Comunitat Valenciana;H.5 % of enterprises that have experienced an ICT security incident (0);Total Enterprises;14,12 Comunitat Valenciana;H.5 % of enterprises that have experienced an ICT security incident (0);Industry;15,44 Comunitat Valenciana;H.5 % of enterprises that have experienced an ICT security incident (0);Construction;11,18 Comunitat Valenciana;H.5 % of enterprises that have experienced an ICT security incident (0);Services;14,16 Comunitat Valenciana;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total Enterprises;69,54 Comunitat Valenciana;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Industry;69,92 Comunitat Valenciana;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Construction;85,13 Comunitat Valenciana;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Services;65,37 Comunitat Valenciana;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total Enterprises;20,42 Comunitat Valenciana;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Industry;9,82 Comunitat Valenciana;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Construction;16,9 Comunitat Valenciana;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Services;29,14 Comunitat Valenciana;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total Enterprises;14,99 Comunitat Valenciana;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Industry;23,27 Comunitat Valenciana;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Construction;14,19 Comunitat Valenciana;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Services;9,08 Comunitat Valenciana;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total Enterprises;14,17 Comunitat Valenciana;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Industry;17,06 Comunitat Valenciana;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Construction;8,43 Comunitat Valenciana;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Services;13,47 Comunitat Valenciana;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total Enterprises;8,1 Comunitat Valenciana;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Industry;13,44 Comunitat Valenciana;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Construction;1,43 Comunitat Valenciana;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Services;5,81 Comunitat Valenciana;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total Enterprises;2,8 Comunitat Valenciana;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Industry;0,52 Comunitat Valenciana;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Construction;0 Comunitat Valenciana;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Services;5,18 Extremadura;H.1 % of enterprises that apply some ICT security measure (0);Total Enterprises;79,02 Extremadura;H.1 % of enterprises that apply some ICT security measure (0);Industry;81,94 Extremadura;H.1 % of enterprises that apply some ICT security measure (0);Construction;72,72 Extremadura;H.1 % of enterprises that apply some ICT security measure (0);Services;80,27 Extremadura;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total Enterprises;88,84 Extremadura;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Industry;92,82 Extremadura;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Construction;89,23 Extremadura;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Services;86,99 Extremadura;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total Enterprises;18,49 Extremadura;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Industry;26,1 Extremadura;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Construction;11,42 Extremadura;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Services;17,73 Extremadura;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total Enterprises;22,84 Extremadura;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Industry;25,48 Extremadura;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Construction;18,07 Extremadura;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Services;23,41 Extremadura;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total Enterprises;31,37 Extremadura;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Industry;35,14 Extremadura;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Construction;32,15 Extremadura;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Services;29,48 Extremadura;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total Enterprises;85,09 Extremadura;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Industry;92,44 Extremadura;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Construction;85,4 Extremadura;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Services;81,83 Extremadura;H.1.F % of enterprises applying network access control as an ICT security measure (1);Total Enterprises;61,2 Extremadura;H.1.F % of enterprises applying network access control as an ICT security measure (1);Industry;68,1 Extremadura;H.1.F % of enterprises applying network access control as an ICT security measure (1);Construction;45,2 Extremadura;H.1.F % of enterprises applying network access control as an ICT security measure (1);Services;63,92 Extremadura;H.1.G % of enterprises applying VPN as an ICT security measure (1);Total Enterprises;37,49 Extremadura;H.1.G % of enterprises applying VPN as an ICT security measure (1);Industry;38,02 Extremadura;H.1.G % of enterprises applying VPN as an ICT security measure (1);Construction;16,62 Extremadura;H.1.G % of enterprises applying VPN as an ICT security measure (1);Services;44,67 Extremadura;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total Enterprises;27,23 Extremadura;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Industry;34,87 Extremadura;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Construction;23,58 Extremadura;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Services;25,26 Extremadura;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total Enterprises;21,97 Extremadura;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Industry;32,38 Extremadura;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Construction;5,88 Extremadura;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Services;23,22 Extremadura;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total Enterprises;18,23 Extremadura;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Industry;21,71 Extremadura;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Construction;9,04 Extremadura;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Services;20,01 Extremadura;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total Enterprises;22,79 Extremadura;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Industry;32 Extremadura;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Construction;10,17 Extremadura;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Services;23,33 Extremadura;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total Enterprises;52,67 Extremadura;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Industry;48,2 Extremadura;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Construction;24,1 Extremadura;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Services;64,73 Extremadura;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total Enterprises;74,37 Extremadura;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Industry;75,78 Extremadura;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Construction;53,43 Extremadura;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Services;76,68 Extremadura;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total Enterprises;36,41 Extremadura;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Industry;51,2 Extremadura;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Construction;30,97 Extremadura;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Services;32,41 Extremadura;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total Enterprises;28,6 Extremadura;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Industry;27,86 Extremadura;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Construction;33,43 Extremadura;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Services;28,2 Extremadura;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total Enterprises;16,38 Extremadura;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Industry;24,68 Extremadura;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Construction;11,29 Extremadura;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Services;14,89 Extremadura;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total Enterprises;76,46 Extremadura;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Industry;78,93 Extremadura;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Construction;76,68 Extremadura;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Services;74,69 Extremadura;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total Enterprises;17,39 Extremadura;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Industry;10,11 Extremadura;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Construction;20,41 Extremadura;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Services;21,55 Extremadura;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total Enterprises;6,15 Extremadura;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Industry;10,96 Extremadura;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Construction;2,91 Extremadura;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Services;3,76 Extremadura;H.5 % of enterprises that have experienced an ICT security incident (0);Total Enterprises;12,06 Extremadura;H.5 % of enterprises that have experienced an ICT security incident (0);Industry;14,61 Extremadura;H.5 % of enterprises that have experienced an ICT security incident (0);Construction;8,21 Extremadura;H.5 % of enterprises that have experienced an ICT security incident (0);Services;12,5 Extremadura;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total Enterprises;71,74 Extremadura;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Industry;82,65 Extremadura;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Construction;14 Extremadura;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Services;81,26 Extremadura;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total Enterprises;20,5 Extremadura;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Industry;19,71 Extremadura;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Construction;32,67 Extremadura;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Services;17,75 Extremadura;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total Enterprises;20,97 Extremadura;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Industry;24,71 Extremadura;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Construction;10 Extremadura;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Services;21,96 Extremadura;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total Enterprises;14,96 Extremadura;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Industry;12,35 Extremadura;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Construction;61,33 Extremadura;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Services;4,29 Extremadura;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total Enterprises;4,29 Extremadura;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Industry;4,99 Extremadura;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Construction;4 Extremadura;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Services;4,02 Extremadura;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total Enterprises;2,19 Extremadura;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Industry;4,99 Extremadura;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Construction;0 Extremadura;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Services;1,37 Galicia;H.1 % of enterprises that apply some ICT security measure (0);Total Enterprises;90,61 Galicia;H.1 % of enterprises that apply some ICT security measure (0);Industry;90,6 Galicia;H.1 % of enterprises that apply some ICT security measure (0);Construction;89,26 Galicia;H.1 % of enterprises that apply some ICT security measure (0);Services;91,04 Galicia;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total Enterprises;90,87 Galicia;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Industry;90,17 Galicia;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Construction;85,93 Galicia;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Services;92,75 Galicia;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total Enterprises;17,73 Galicia;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Industry;20,61 Galicia;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Construction;21,82 Galicia;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Services;15 Galicia;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total Enterprises;33,08 Galicia;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Industry;38,62 Galicia;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Construction;34,02 Galicia;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Services;29,96 Galicia;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total Enterprises;33,93 Galicia;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Industry;33,59 Galicia;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Construction;29,3 Galicia;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Services;35,53 Galicia;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total Enterprises;89,93 Galicia;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Industry;92,68 Galicia;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Construction;83,46 Galicia;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Services;90,51 Galicia;H.1.F % of enterprises applying network access control as an ICT security measure (1);Total Enterprises;66,95 Galicia;H.1.F % of enterprises applying network access control as an ICT security measure (1);Industry;69,6 Galicia;H.1.F % of enterprises applying network access control as an ICT security measure (1);Construction;56,55 Galicia;H.1.F % of enterprises applying network access control as an ICT security measure (1);Services;68,8 Galicia;H.1.G % of enterprises applying VPN as an ICT security measure (1);Total Enterprises;52,94 Galicia;H.1.G % of enterprises applying VPN as an ICT security measure (1);Industry;56,27 Galicia;H.1.G % of enterprises applying VPN as an ICT security measure (1);Construction;38,07 Galicia;H.1.G % of enterprises applying VPN as an ICT security measure (1);Services;55,8 Galicia;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total Enterprises;32,69 Galicia;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Industry;36,19 Galicia;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Construction;24,74 Galicia;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Services;33,34 Galicia;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total Enterprises;33,09 Galicia;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Industry;35 Galicia;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Construction;16,68 Galicia;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Services;37,15 Galicia;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total Enterprises;23,66 Galicia;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Industry;29 Galicia;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Construction;8,89 Galicia;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Services;25,47 Galicia;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total Enterprises;29,34 Galicia;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Industry;35,26 Galicia;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Construction;12,26 Galicia;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Services;31,57 Galicia;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total Enterprises;58 Galicia;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Industry;54,86 Galicia;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Construction;51,1 Galicia;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Services;61,72 Galicia;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total Enterprises;76,06 Galicia;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Industry;78,38 Galicia;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Construction;50,14 Galicia;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Services;81,61 Galicia;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total Enterprises;40,01 Galicia;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Industry;36,32 Galicia;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Construction;57,2 Galicia;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Services;37,32 Galicia;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total Enterprises;31,82 Galicia;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Industry;26,91 Galicia;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Construction;22,5 Galicia;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Services;36,43 Galicia;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total Enterprises;24,28 Galicia;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Industry;22,83 Galicia;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Construction;14,79 Galicia;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Services;27,99 Galicia;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total Enterprises;74,47 Galicia;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Industry;76,45 Galicia;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Construction;75,31 Galicia;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Services;73,49 Galicia;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total Enterprises;15,25 Galicia;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Industry;16,71 Galicia;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Construction;23,46 Galicia;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Services;13,28 Galicia;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total Enterprises;10,28 Galicia;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Industry;6,83 Galicia;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Construction;1,23 Galicia;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Services;13,22 Galicia;H.5 % of enterprises that have experienced an ICT security incident (0);Total Enterprises;19,16 Galicia;H.5 % of enterprises that have experienced an ICT security incident (0);Industry;16,28 Galicia;H.5 % of enterprises that have experienced an ICT security incident (0);Construction;21 Galicia;H.5 % of enterprises that have experienced an ICT security incident (0);Services;20,06 Galicia;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total Enterprises;79,65 Galicia;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Industry;89,61 Galicia;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Construction;74,72 Galicia;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Services;77,13 Galicia;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total Enterprises;10,24 Galicia;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Industry;6,73 Galicia;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Construction;10,5 Galicia;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Services;11,62 Galicia;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total Enterprises;17,05 Galicia;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Industry;6,31 Galicia;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Construction;29,15 Galicia;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Services;17,55 Galicia;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total Enterprises;21,81 Galicia;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Industry;11,6 Galicia;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Construction;29,15 Galicia;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Services;23,65 Galicia;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total Enterprises;5,26 Galicia;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Industry;2,61 Galicia;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Construction;6,64 Galicia;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Services;5,91 Galicia;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total Enterprises;1,56 Galicia;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Industry;4,43 Galicia;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Construction;0 Galicia;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Services;0,88 Madrid, Comunidad de;H.1 % of enterprises that apply some ICT security measure (0);Total Enterprises;90,32 Madrid, Comunidad de;H.1 % of enterprises that apply some ICT security measure (0);Industry;90,39 Madrid, Comunidad de;H.1 % of enterprises that apply some ICT security measure (0);Construction;89,5 Madrid, Comunidad de;H.1 % of enterprises that apply some ICT security measure (0);Services;90,47 Madrid, Comunidad de;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total Enterprises;93,85 Madrid, Comunidad de;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Industry;89,88 Madrid, Comunidad de;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Construction;95,34 Madrid, Comunidad de;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Services;94,36 Madrid, Comunidad de;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total Enterprises;28,76 Madrid, Comunidad de;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Industry;28,36 Madrid, Comunidad de;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Construction;20,15 Madrid, Comunidad de;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Services;30,64 Madrid, Comunidad de;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total Enterprises;43,25 Madrid, Comunidad de;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Industry;29,38 Madrid, Comunidad de;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Construction;20,98 Madrid, Comunidad de;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Services;50,77 Madrid, Comunidad de;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total Enterprises;51 Madrid, Comunidad de;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Industry;37,26 Madrid, Comunidad de;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Construction;32,73 Madrid, Comunidad de;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Services;57,65 Madrid, Comunidad de;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total Enterprises;93,37 Madrid, Comunidad de;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Industry;92,23 Madrid, Comunidad de;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Construction;83,64 Madrid, Comunidad de;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Services;95,64 Madrid, Comunidad de;H.1.F % of enterprises applying network access control as an ICT security measure (1);Total Enterprises;76,51 Madrid, Comunidad de;H.1.F % of enterprises applying network access control as an ICT security measure (1);Industry;70,96 Madrid, Comunidad de;H.1.F % of enterprises applying network access control as an ICT security measure (1);Construction;59,68 Madrid, Comunidad de;H.1.F % of enterprises applying network access control as an ICT security measure (1);Services;81,18 Madrid, Comunidad de;H.1.G % of enterprises applying VPN as an ICT security measure (1);Total Enterprises;63,59 Madrid, Comunidad de;H.1.G % of enterprises applying VPN as an ICT security measure (1);Industry;54,73 Madrid, Comunidad de;H.1.G % of enterprises applying VPN as an ICT security measure (1);Construction;43,84 Madrid, Comunidad de;H.1.G % of enterprises applying VPN as an ICT security measure (1);Services;69,56 Madrid, Comunidad de;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total Enterprises;51,83 Madrid, Comunidad de;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Industry;44,35 Madrid, Comunidad de;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Construction;31,22 Madrid, Comunidad de;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Services;57,68 Madrid, Comunidad de;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total Enterprises;48,95 Madrid, Comunidad de;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Industry;40,03 Madrid, Comunidad de;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Construction;17,6 Madrid, Comunidad de;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Services;57,35 Madrid, Comunidad de;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total Enterprises;42,27 Madrid, Comunidad de;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Industry;32,88 Madrid, Comunidad de;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Construction;14,63 Madrid, Comunidad de;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Services;49,99 Madrid, Comunidad de;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total Enterprises;46,68 Madrid, Comunidad de;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Industry;40,47 Madrid, Comunidad de;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Construction;16,48 Madrid, Comunidad de;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Services;54,27 Madrid, Comunidad de;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total Enterprises;70,12 Madrid, Comunidad de;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Industry;63,36 Madrid, Comunidad de;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Construction;52,6 Madrid, Comunidad de;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Services;75,19 Madrid, Comunidad de;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total Enterprises;80,97 Madrid, Comunidad de;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Industry;74,76 Madrid, Comunidad de;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Construction;78,54 Madrid, Comunidad de;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Services;82,4 Madrid, Comunidad de;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total Enterprises;52,74 Madrid, Comunidad de;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Industry;46,95 Madrid, Comunidad de;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Construction;26,71 Madrid, Comunidad de;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Services;57,56 Madrid, Comunidad de;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total Enterprises;46,7 Madrid, Comunidad de;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Industry;35,49 Madrid, Comunidad de;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Construction;39,53 Madrid, Comunidad de;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Services;49,7 Madrid, Comunidad de;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total Enterprises;41,55 Madrid, Comunidad de;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Industry;31,69 Madrid, Comunidad de;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Construction;19,57 Madrid, Comunidad de;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Services;48,23 Madrid, Comunidad de;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total Enterprises;74,42 Madrid, Comunidad de;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Industry;68,75 Madrid, Comunidad de;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Construction;54,41 Madrid, Comunidad de;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Services;76,91 Madrid, Comunidad de;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total Enterprises;17,24 Madrid, Comunidad de;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Industry;21,51 Madrid, Comunidad de;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Construction;24,46 Madrid, Comunidad de;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Services;16,04 Madrid, Comunidad de;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total Enterprises;8,34 Madrid, Comunidad de;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Industry;9,73 Madrid, Comunidad de;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Construction;21,13 Madrid, Comunidad de;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Services;7,06 Madrid, Comunidad de;H.5 % of enterprises that have experienced an ICT security incident (0);Total Enterprises;18,34 Madrid, Comunidad de;H.5 % of enterprises that have experienced an ICT security incident (0);Industry;10,89 Madrid, Comunidad de;H.5 % of enterprises that have experienced an ICT security incident (0);Construction;19,53 Madrid, Comunidad de;H.5 % of enterprises that have experienced an ICT security incident (0);Services;19,63 Madrid, Comunidad de;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total Enterprises;70,33 Madrid, Comunidad de;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Industry;67,16 Madrid, Comunidad de;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Construction;70,31 Madrid, Comunidad de;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Services;70,7 Madrid, Comunidad de;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total Enterprises;23,69 Madrid, Comunidad de;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Industry;21,09 Madrid, Comunidad de;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Construction;19,33 Madrid, Comunidad de;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Services;24,9 Madrid, Comunidad de;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total Enterprises;24,61 Madrid, Comunidad de;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Industry;13,55 Madrid, Comunidad de;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Construction;18,66 Madrid, Comunidad de;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Services;27,14 Madrid, Comunidad de;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total Enterprises;15,18 Madrid, Comunidad de;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Industry;20,7 Madrid, Comunidad de;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Construction;15,35 Madrid, Comunidad de;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Services;14,52 Madrid, Comunidad de;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total Enterprises;10,53 Madrid, Comunidad de;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Industry;11,93 Madrid, Comunidad de;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Construction;10,67 Madrid, Comunidad de;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Services;10,34 Madrid, Comunidad de;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total Enterprises;7,39 Madrid, Comunidad de;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Industry;8,91 Madrid, Comunidad de;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Construction;2,71 Madrid, Comunidad de;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Services;8,2 Murcia, Región de;H.1 % of enterprises that apply some ICT security measure (0);Total Enterprises;88,29 Murcia, Región de;H.1 % of enterprises that apply some ICT security measure (0);Industry;90,11 Murcia, Región de;H.1 % of enterprises that apply some ICT security measure (0);Construction;84,96 Murcia, Región de;H.1 % of enterprises that apply some ICT security measure (0);Services;88,31 Murcia, Región de;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total Enterprises;89,98 Murcia, Región de;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Industry;86,96 Murcia, Región de;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Construction;84,58 Murcia, Región de;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Services;93,62 Murcia, Región de;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total Enterprises;23,04 Murcia, Región de;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Industry;26,63 Murcia, Región de;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Construction;11,35 Murcia, Región de;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Services;24,61 Murcia, Región de;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total Enterprises;29,88 Murcia, Región de;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Industry;31,13 Murcia, Región de;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Construction;24,87 Murcia, Región de;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Services;30,72 Murcia, Región de;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total Enterprises;36,67 Murcia, Región de;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Industry;42,41 Murcia, Región de;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Construction;27,24 Murcia, Región de;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Services;36,15 Murcia, Región de;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total Enterprises;90,38 Murcia, Región de;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Industry;93,5 Murcia, Región de;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Construction;89,39 Murcia, Región de;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Services;88,76 Murcia, Región de;H.1.F % of enterprises applying network access control as an ICT security measure (1);Total Enterprises;68,12 Murcia, Región de;H.1.F % of enterprises applying network access control as an ICT security measure (1);Industry;64,72 Murcia, Región de;H.1.F % of enterprises applying network access control as an ICT security measure (1);Construction;50,81 Murcia, Región de;H.1.F % of enterprises applying network access control as an ICT security measure (1);Services;75,86 Murcia, Región de;H.1.G % of enterprises applying VPN as an ICT security measure (1);Total Enterprises;40,85 Murcia, Región de;H.1.G % of enterprises applying VPN as an ICT security measure (1);Industry;46,79 Murcia, Región de;H.1.G % of enterprises applying VPN as an ICT security measure (1);Construction;31,45 Murcia, Región de;H.1.G % of enterprises applying VPN as an ICT security measure (1);Services;40,21 Murcia, Región de;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total Enterprises;31,38 Murcia, Región de;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Industry;33,17 Murcia, Región de;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Construction;19,23 Murcia, Región de;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Services;34,2 Murcia, Región de;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total Enterprises;33,3 Murcia, Región de;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Industry;38,4 Murcia, Región de;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Construction;19,7 Murcia, Región de;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Services;34,54 Murcia, Región de;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total Enterprises;24,69 Murcia, Región de;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Industry;25,23 Murcia, Región de;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Construction;14,79 Murcia, Región de;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Services;27,56 Murcia, Región de;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total Enterprises;31,35 Murcia, Región de;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Industry;37,73 Murcia, Región de;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Construction;24,31 Murcia, Región de;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Services;29,67 Murcia, Región de;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total Enterprises;59,92 Murcia, Región de;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Industry;55,12 Murcia, Región de;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Construction;60,79 Murcia, Región de;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Services;62,62 Murcia, Región de;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total Enterprises;76,94 Murcia, Región de;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Industry;73,57 Murcia, Región de;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Construction;83,84 Murcia, Región de;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Services;76,62 Murcia, Región de;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total Enterprises;44,22 Murcia, Región de;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Industry;49,35 Murcia, Región de;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Construction;43,73 Murcia, Región de;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Services;41,56 Murcia, Región de;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total Enterprises;34,84 Murcia, Región de;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Industry;35,55 Murcia, Región de;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Construction;27,13 Murcia, Región de;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Services;36,87 Murcia, Región de;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total Enterprises;19,6 Murcia, Región de;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Industry;20,34 Murcia, Región de;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Construction;8,83 Murcia, Región de;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Services;22,78 Murcia, Región de;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total Enterprises;72,94 Murcia, Región de;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Industry;77,37 Murcia, Región de;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Construction;77,38 Murcia, Región de;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Services;69,95 Murcia, Región de;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total Enterprises;12,03 Murcia, Región de;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Industry;17,77 Murcia, Región de;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Construction;22,62 Murcia, Región de;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Services;7,53 Murcia, Región de;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total Enterprises;15,03 Murcia, Región de;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Industry;4,87 Murcia, Región de;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Construction;0 Murcia, Región de;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Services;22,53 Murcia, Región de;H.5 % of enterprises that have experienced an ICT security incident (0);Total Enterprises;12,97 Murcia, Región de;H.5 % of enterprises that have experienced an ICT security incident (0);Industry;12,24 Murcia, Región de;H.5 % of enterprises that have experienced an ICT security incident (0);Construction;11,71 Murcia, Región de;H.5 % of enterprises that have experienced an ICT security incident (0);Services;13,83 Murcia, Región de;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total Enterprises;75,12 Murcia, Región de;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Industry;61,92 Murcia, Región de;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Construction;98,83 Murcia, Región de;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Services;75,47 Murcia, Región de;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total Enterprises;29,27 Murcia, Región de;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Industry;33,58 Murcia, Región de;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Construction;66,27 Murcia, Región de;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Services;16,37 Murcia, Región de;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total Enterprises;38,7 Murcia, Región de;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Industry;23,14 Murcia, Región de;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Construction;70,94 Murcia, Región de;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Services;37,89 Murcia, Región de;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total Enterprises;34,89 Murcia, Región de;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Industry;20,65 Murcia, Región de;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Construction;69,77 Murcia, Región de;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Services;32,62 Murcia, Región de;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total Enterprises;6,87 Murcia, Región de;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Industry;8,81 Murcia, Región de;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Construction;0 Murcia, Región de;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Services;7,78 Murcia, Región de;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total Enterprises;2,57 Murcia, Región de;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Industry;1,69 Murcia, Región de;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Construction;0 Murcia, Región de;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Services;3,78 Navarra, Comunidad Foral de;H.1 % of enterprises that apply some ICT security measure (0);Total Enterprises;93,26 Navarra, Comunidad Foral de;H.1 % of enterprises that apply some ICT security measure (0);Industry;95,95 Navarra, Comunidad Foral de;H.1 % of enterprises that apply some ICT security measure (0);Construction;88,74 Navarra, Comunidad Foral de;H.1 % of enterprises that apply some ICT security measure (0);Services;92,16 Navarra, Comunidad Foral de;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total Enterprises;93,45 Navarra, Comunidad Foral de;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Industry;88,65 Navarra, Comunidad Foral de;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Construction;91,78 Navarra, Comunidad Foral de;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Services;98,38 Navarra, Comunidad Foral de;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total Enterprises;21,93 Navarra, Comunidad Foral de;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Industry;25,73 Navarra, Comunidad Foral de;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Construction;19,31 Navarra, Comunidad Foral de;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Services;19,12 Navarra, Comunidad Foral de;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total Enterprises;32,89 Navarra, Comunidad Foral de;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Industry;44,44 Navarra, Comunidad Foral de;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Construction;7,99 Navarra, Comunidad Foral de;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Services;29,11 Navarra, Comunidad Foral de;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total Enterprises;34,67 Navarra, Comunidad Foral de;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Industry;38,94 Navarra, Comunidad Foral de;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Construction;19,52 Navarra, Comunidad Foral de;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Services;34,93 Navarra, Comunidad Foral de;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total Enterprises;87,4 Navarra, Comunidad Foral de;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Industry;93,54 Navarra, Comunidad Foral de;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Construction;89,72 Navarra, Comunidad Foral de;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Services;81,04 Navarra, Comunidad Foral de;H.1.F % of enterprises applying network access control as an ICT security measure (1);Total Enterprises;64,22 Navarra, Comunidad Foral de;H.1.F % of enterprises applying network access control as an ICT security measure (1);Industry;69,95 Navarra, Comunidad Foral de;H.1.F % of enterprises applying network access control as an ICT security measure (1);Construction;40,63 Navarra, Comunidad Foral de;H.1.F % of enterprises applying network access control as an ICT security measure (1);Services;65,49 Navarra, Comunidad Foral de;H.1.G % of enterprises applying VPN as an ICT security measure (1);Total Enterprises;48,98 Navarra, Comunidad Foral de;H.1.G % of enterprises applying VPN as an ICT security measure (1);Industry;56,63 Navarra, Comunidad Foral de;H.1.G % of enterprises applying VPN as an ICT security measure (1);Construction;22,8 Navarra, Comunidad Foral de;H.1.G % of enterprises applying VPN as an ICT security measure (1);Services;49,19 Navarra, Comunidad Foral de;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total Enterprises;35,81 Navarra, Comunidad Foral de;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Industry;40,79 Navarra, Comunidad Foral de;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Construction;17,64 Navarra, Comunidad Foral de;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Services;36,26 Navarra, Comunidad Foral de;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total Enterprises;33,47 Navarra, Comunidad Foral de;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Industry;41,52 Navarra, Comunidad Foral de;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Construction;11,59 Navarra, Comunidad Foral de;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Services;32,1 Navarra, Comunidad Foral de;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total Enterprises;26,1 Navarra, Comunidad Foral de;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Industry;32,81 Navarra, Comunidad Foral de;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Construction;5,69 Navarra, Comunidad Foral de;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Services;25,56 Navarra, Comunidad Foral de;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total Enterprises;34,57 Navarra, Comunidad Foral de;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Industry;38,18 Navarra, Comunidad Foral de;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Construction;19,35 Navarra, Comunidad Foral de;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Services;35,47 Navarra, Comunidad Foral de;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total Enterprises;54,89 Navarra, Comunidad Foral de;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Industry;55,71 Navarra, Comunidad Foral de;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Construction;30,78 Navarra, Comunidad Foral de;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Services;60,87 Navarra, Comunidad Foral de;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total Enterprises;81,23 Navarra, Comunidad Foral de;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Industry;90,38 Navarra, Comunidad Foral de;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Construction;67,03 Navarra, Comunidad Foral de;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Services;75,44 Navarra, Comunidad Foral de;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total Enterprises;47,04 Navarra, Comunidad Foral de;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Industry;48,16 Navarra, Comunidad Foral de;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Construction;17,8 Navarra, Comunidad Foral de;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Services;50,22 Navarra, Comunidad Foral de;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total Enterprises;35,93 Navarra, Comunidad Foral de;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Industry;34,84 Navarra, Comunidad Foral de;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Construction;24,05 Navarra, Comunidad Foral de;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Services;38,54 Navarra, Comunidad Foral de;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total Enterprises;27,44 Navarra, Comunidad Foral de;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Industry;30,81 Navarra, Comunidad Foral de;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Construction;17,49 Navarra, Comunidad Foral de;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Services;27,33 Navarra, Comunidad Foral de;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total Enterprises;71,24 Navarra, Comunidad Foral de;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Industry;73,26 Navarra, Comunidad Foral de;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Construction;20,43 Navarra, Comunidad Foral de;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Services;78,64 Navarra, Comunidad Foral de;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total Enterprises;15,28 Navarra, Comunidad Foral de;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Industry;15,58 Navarra, Comunidad Foral de;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Construction;70,02 Navarra, Comunidad Foral de;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Services;4,81 Navarra, Comunidad Foral de;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total Enterprises;13,48 Navarra, Comunidad Foral de;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Industry;11,16 Navarra, Comunidad Foral de;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Construction;9,55 Navarra, Comunidad Foral de;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Services;16,55 Navarra, Comunidad Foral de;H.5 % of enterprises that have experienced an ICT security incident (0);Total Enterprises;14,98 Navarra, Comunidad Foral de;H.5 % of enterprises that have experienced an ICT security incident (0);Industry;18,07 Navarra, Comunidad Foral de;H.5 % of enterprises that have experienced an ICT security incident (0);Construction;14,18 Navarra, Comunidad Foral de;H.5 % of enterprises that have experienced an ICT security incident (0);Services;12,44 Navarra, Comunidad Foral de;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total Enterprises;73,15 Navarra, Comunidad Foral de;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Industry;73,07 Navarra, Comunidad Foral de;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Construction;85,55 Navarra, Comunidad Foral de;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Services;69,14 Navarra, Comunidad Foral de;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total Enterprises;27,25 Navarra, Comunidad Foral de;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Industry;27,67 Navarra, Comunidad Foral de;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Construction;34,3 Navarra, Comunidad Foral de;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Services;24,37 Navarra, Comunidad Foral de;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total Enterprises;22,6 Navarra, Comunidad Foral de;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Industry;28,85 Navarra, Comunidad Foral de;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Construction;22,52 Navarra, Comunidad Foral de;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Services;14,53 Navarra, Comunidad Foral de;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total Enterprises;14,1 Navarra, Comunidad Foral de;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Industry;7,75 Navarra, Comunidad Foral de;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Construction;63,03 Navarra, Comunidad Foral de;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Services;6,14 Navarra, Comunidad Foral de;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total Enterprises;2,85 Navarra, Comunidad Foral de;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Industry;0 Navarra, Comunidad Foral de;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Construction;19,85 Navarra, Comunidad Foral de;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Services;0,92 Navarra, Comunidad Foral de;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total Enterprises;5,42 Navarra, Comunidad Foral de;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Industry;5,9 Navarra, Comunidad Foral de;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Construction;19,85 Navarra, Comunidad Foral de;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Services;0,02 País Vasco;H.1 % of enterprises that apply some ICT security measure (0);Total Enterprises;93,4 País Vasco;H.1 % of enterprises that apply some ICT security measure (0);Industry;95 País Vasco;H.1 % of enterprises that apply some ICT security measure (0);Construction;91,22 País Vasco;H.1 % of enterprises that apply some ICT security measure (0);Services;92,65 País Vasco;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total Enterprises;89,41 País Vasco;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Industry;87,56 País Vasco;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Construction;85,65 País Vasco;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Services;91,73 País Vasco;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total Enterprises;20,76 País Vasco;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Industry;20,22 País Vasco;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Construction;21,03 País Vasco;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Services;21,13 País Vasco;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total Enterprises;34,98 País Vasco;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Industry;30,72 País Vasco;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Construction;26,98 País Vasco;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Services;40,15 País Vasco;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total Enterprises;40,46 País Vasco;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Industry;37,7 País Vasco;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Construction;33,88 País Vasco;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Services;44,11 País Vasco;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total Enterprises;95,46 País Vasco;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Industry;96,51 País Vasco;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Construction;94,83 País Vasco;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Services;94,77 País Vasco;H.1.F % of enterprises applying network access control as an ICT security measure (1);Total Enterprises;69,88 País Vasco;H.1.F % of enterprises applying network access control as an ICT security measure (1);Industry;74,35 País Vasco;H.1.F % of enterprises applying network access control as an ICT security measure (1);Construction;57,39 País Vasco;H.1.F % of enterprises applying network access control as an ICT security measure (1);Services;69,06 País Vasco;H.1.G % of enterprises applying VPN as an ICT security measure (1);Total Enterprises;57,46 País Vasco;H.1.G % of enterprises applying VPN as an ICT security measure (1);Industry;62,09 País Vasco;H.1.G % of enterprises applying VPN as an ICT security measure (1);Construction;45,93 País Vasco;H.1.G % of enterprises applying VPN as an ICT security measure (1);Services;56,31 País Vasco;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total Enterprises;39,11 País Vasco;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Industry;38,73 País Vasco;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Construction;18,09 País Vasco;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Services;44,05 País Vasco;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total Enterprises;38,5 País Vasco;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Industry;37,91 País Vasco;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Construction;13,71 País Vasco;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Services;44,43 País Vasco;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total Enterprises;29,28 País Vasco;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Industry;29,63 País Vasco;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Construction;10,8 País Vasco;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Services;33,07 País Vasco;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total Enterprises;34,76 País Vasco;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Industry;40,75 País Vasco;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Construction;14,23 País Vasco;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Services;34,51 País Vasco;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total Enterprises;60,23 País Vasco;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Industry;59,49 País Vasco;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Construction;44,64 País Vasco;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Services;64,26 País Vasco;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total Enterprises;78,39 País Vasco;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Industry;72,6 País Vasco;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Construction;60,93 País Vasco;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Services;85,35 País Vasco;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total Enterprises;42,92 País Vasco;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Industry;44,12 País Vasco;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Construction;37,52 País Vasco;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Services;42,86 País Vasco;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total Enterprises;38,12 País Vasco;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Industry;36,72 País Vasco;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Construction;39,8 País Vasco;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Services;38,9 País Vasco;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total Enterprises;28,72 País Vasco;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Industry;29,58 País Vasco;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Construction;13,17 País Vasco;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Services;31,53 País Vasco;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total Enterprises;64,45 País Vasco;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Industry;65,21 País Vasco;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Construction;77,11 País Vasco;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Services;62,7 País Vasco;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total Enterprises;23,65 País Vasco;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Industry;25,1 País Vasco;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Construction;22,89 País Vasco;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Services;22,65 País Vasco;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total Enterprises;11,91 País Vasco;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Industry;9,69 País Vasco;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Construction;0 País Vasco;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Services;14,64 País Vasco;H.5 % of enterprises that have experienced an ICT security incident (0);Total Enterprises;14,45 País Vasco;H.5 % of enterprises that have experienced an ICT security incident (0);Industry;10,35 País Vasco;H.5 % of enterprises that have experienced an ICT security incident (0);Construction;7,95 País Vasco;H.5 % of enterprises that have experienced an ICT security incident (0);Services;19,11 País Vasco;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total Enterprises;76,69 País Vasco;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Industry;86,1 País Vasco;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Construction;53,12 País Vasco;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Services;74,91 País Vasco;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total Enterprises;16,5 País Vasco;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Industry;10,77 País Vasco;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Construction;0 País Vasco;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Services;20,46 País Vasco;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total Enterprises;20,86 País Vasco;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Industry;18,77 País Vasco;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Construction;1,72 País Vasco;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Services;23,52 País Vasco;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total Enterprises;13,06 País Vasco;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Industry;5,52 País Vasco;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Construction;32,72 País Vasco;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Services;14,41 País Vasco;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total Enterprises;9,08 País Vasco;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Industry;10,55 País Vasco;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Construction;20,96 País Vasco;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Services;7,35 País Vasco;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total Enterprises;6,9 País Vasco;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Industry;1,75 País Vasco;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Construction;20,96 País Vasco;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Services;7,76 Rioja, La;H.1 % of enterprises that apply some ICT security measure (0);Total Enterprises;88,13 Rioja, La;H.1 % of enterprises that apply some ICT security measure (0);Industry;86,05 Rioja, La;H.1 % of enterprises that apply some ICT security measure (0);Construction;70,16 Rioja, La;H.1 % of enterprises that apply some ICT security measure (0);Services;96,22 Rioja, La;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total Enterprises;88,59 Rioja, La;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Industry;86,17 Rioja, La;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Construction;87,38 Rioja, La;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Services;91,19 Rioja, La;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total Enterprises;22,51 Rioja, La;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Industry;17,31 Rioja, La;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Construction;31,71 Rioja, La;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Services;25,3 Rioja, La;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total Enterprises;29,29 Rioja, La;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Industry;28,77 Rioja, La;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Construction;20,11 Rioja, La;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Services;31,97 Rioja, La;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total Enterprises;38,03 Rioja, La;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Industry;41,89 Rioja, La;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Construction;28 Rioja, La;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Services;36,72 Rioja, La;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total Enterprises;87,92 Rioja, La;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Industry;88 Rioja, La;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Construction;93,64 Rioja, La;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Services;86,48 Rioja, La;H.1.F % of enterprises applying network access control as an ICT security measure (1);Total Enterprises;69,54 Rioja, La;H.1.F % of enterprises applying network access control as an ICT security measure (1);Industry;75,17 Rioja, La;H.1.F % of enterprises applying network access control as an ICT security measure (1);Construction;43,05 Rioja, La;H.1.F % of enterprises applying network access control as an ICT security measure (1);Services;70,46 Rioja, La;H.1.G % of enterprises applying VPN as an ICT security measure (1);Total Enterprises;48,81 Rioja, La;H.1.G % of enterprises applying VPN as an ICT security measure (1);Industry;50,04 Rioja, La;H.1.G % of enterprises applying VPN as an ICT security measure (1);Construction;41,63 Rioja, La;H.1.G % of enterprises applying VPN as an ICT security measure (1);Services;49,35 Rioja, La;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total Enterprises;37,24 Rioja, La;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Industry;37,73 Rioja, La;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Construction;42,04 Rioja, La;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Services;35,63 Rioja, La;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total Enterprises;32,78 Rioja, La;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Industry;33,71 Rioja, La;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Construction;15,27 Rioja, La;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Services;36,07 Rioja, La;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total Enterprises;26,62 Rioja, La;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Industry;30,39 Rioja, La;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Construction;14,25 Rioja, La;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Services;25,95 Rioja, La;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total Enterprises;26,78 Rioja, La;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Industry;26,17 Rioja, La;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Construction;8,91 Rioja, La;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Services;31,62 Rioja, La;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total Enterprises;55,24 Rioja, La;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Industry;59,33 Rioja, La;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Construction;21,63 Rioja, La;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Services;59,33 Rioja, La;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total Enterprises;81,91 Rioja, La;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Industry;82,09 Rioja, La;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Construction;63,53 Rioja, La;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Services;83,34 Rioja, La;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total Enterprises;38,74 Rioja, La;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Industry;30,09 Rioja, La;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Construction;36,47 Rioja, La;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Services;47,24 Rioja, La;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total Enterprises;26,24 Rioja, La;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Industry;15,31 Rioja, La;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Construction;29,41 Rioja, La;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Services;36,45 Rioja, La;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total Enterprises;23,57 Rioja, La;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Industry;24,68 Rioja, La;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Construction;22,25 Rioja, La;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Services;22,81 Rioja, La;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total Enterprises;69,99 Rioja, La;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Industry;79,58 Rioja, La;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Construction;79,93 Rioja, La;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Services;55,7 Rioja, La;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total Enterprises;14,76 Rioja, La;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Industry;8,94 Rioja, La;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Construction;20,07 Rioja, La;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Services;19,8 Rioja, La;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total Enterprises;15,26 Rioja, La;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Industry;11,48 Rioja, La;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Construction;0 Rioja, La;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Services;24,5 Rioja, La;H.5 % of enterprises that have experienced an ICT security incident (0);Total Enterprises;7,74 Rioja, La;H.5 % of enterprises that have experienced an ICT security incident (0);Industry;8,55 Rioja, La;H.5 % of enterprises that have experienced an ICT security incident (0);Construction;4,46 Rioja, La;H.5 % of enterprises that have experienced an ICT security incident (0);Services;7,94 Rioja, La;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total Enterprises;90,52 Rioja, La;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Industry;94,05 Rioja, La;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Construction;100 Rioja, La;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Services;84,69 Rioja, La;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total Enterprises;19,3 Rioja, La;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Industry;33,16 Rioja, La;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Construction;0 Rioja, La;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Services;6,87 Rioja, La;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total Enterprises;14,69 Rioja, La;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Industry;19,55 Rioja, La;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Construction;0 Rioja, La;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Services;11,77 Rioja, La;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total Enterprises;15,9 Rioja, La;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Industry;9,46 Rioja, La;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Construction;100 Rioja, La;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Services;7,85 Rioja, La;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total Enterprises;3,61 Rioja, La;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Industry;0 Rioja, La;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Construction;0 Rioja, La;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Services;8,44 Rioja, La;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total Enterprises;4,67 Rioja, La;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Industry;9,46 Rioja, La;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Construction;0 Rioja, La;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Services;0 Ceuta;H.1 % of enterprises that apply some ICT security measure (0);Total Enterprises;86,79 Ceuta;H.1 % of enterprises that apply some ICT security measure (0);Industry;61,54 Ceuta;H.1 % of enterprises that apply some ICT security measure (0);Construction;100 Ceuta;H.1 % of enterprises that apply some ICT security measure (0);Services;87,84 Ceuta;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total Enterprises;77,17 Ceuta;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Industry;100 Ceuta;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Construction;68,42 Ceuta;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Services;76,92 Ceuta;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total Enterprises;11,96 Ceuta;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Industry;25 Ceuta;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Construction;0 Ceuta;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Services;13,85 Ceuta;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total Enterprises;25 Ceuta;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Industry;37,5 Ceuta;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Construction;26,32 Ceuta;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Services;23,08 Ceuta;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total Enterprises;21,74 Ceuta;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Industry;62,5 Ceuta;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Construction;10,53 Ceuta;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Services;20 Ceuta;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total Enterprises;86,41 Ceuta;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Industry;100 Ceuta;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Construction;63,16 Ceuta;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Services;91,54 Ceuta;H.1.F % of enterprises applying network access control as an ICT security measure (1);Total Enterprises;45,65 Ceuta;H.1.F % of enterprises applying network access control as an ICT security measure (1);Industry;87,5 Ceuta;H.1.F % of enterprises applying network access control as an ICT security measure (1);Construction;42,11 Ceuta;H.1.F % of enterprises applying network access control as an ICT security measure (1);Services;41,54 Ceuta;H.1.G % of enterprises applying VPN as an ICT security measure (1);Total Enterprises;22,28 Ceuta;H.1.G % of enterprises applying VPN as an ICT security measure (1);Industry;37,5 Ceuta;H.1.G % of enterprises applying VPN as an ICT security measure (1);Construction;5,26 Ceuta;H.1.G % of enterprises applying VPN as an ICT security measure (1);Services;25,38 Ceuta;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total Enterprises;19,57 Ceuta;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Industry;37,5 Ceuta;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Construction;0 Ceuta;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Services;23,08 Ceuta;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total Enterprises;15,22 Ceuta;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Industry;50 Ceuta;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Construction;5,26 Ceuta;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Services;13,85 Ceuta;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total Enterprises;8,15 Ceuta;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Industry;25 Ceuta;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Construction;0 Ceuta;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Services;8,46 Ceuta;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total Enterprises;18,48 Ceuta;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Industry;25 Ceuta;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Construction;15,79 Ceuta;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Services;18,46 Ceuta;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total Enterprises;41,85 Ceuta;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Industry;62,5 Ceuta;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Construction;47,37 Ceuta;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Services;37,69 Ceuta;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total Enterprises;66,23 Ceuta;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Industry;60 Ceuta;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Construction;11,11 Ceuta;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Services;87,76 Ceuta;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total Enterprises;59,74 Ceuta;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Industry;40 Ceuta;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Construction;66,67 Ceuta;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Services;61,22 Ceuta;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total Enterprises;23,38 Ceuta;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Industry;20 Ceuta;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Construction;33,33 Ceuta;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Services;20,41 Ceuta;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total Enterprises;8,49 Ceuta;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Industry;7,69 Ceuta;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Construction;0 Ceuta;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Services;10,81 Ceuta;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total Enterprises;66,67 Ceuta;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Industry;0 Ceuta;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Construction;. Ceuta;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Services;75 Ceuta;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total Enterprises;33,33 Ceuta;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Industry;100 Ceuta;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Construction;. Ceuta;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Services;25 Ceuta;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total Enterprises;0 Ceuta;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Industry;0 Ceuta;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Construction;. Ceuta;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Services;0 Ceuta;H.5 % of enterprises that have experienced an ICT security incident (0);Total Enterprises;6,13 Ceuta;H.5 % of enterprises that have experienced an ICT security incident (0);Industry;7,69 Ceuta;H.5 % of enterprises that have experienced an ICT security incident (0);Construction;0 Ceuta;H.5 % of enterprises that have experienced an ICT security incident (0);Services;7,43 Ceuta;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total Enterprises;84,62 Ceuta;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Industry;100 Ceuta;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Construction;. Ceuta;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Services;81,82 Ceuta;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total Enterprises;30,77 Ceuta;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Industry;0 Ceuta;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Construction;. Ceuta;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Services;36,36 Ceuta;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total Enterprises;46,15 Ceuta;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Industry;0 Ceuta;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Construction;. Ceuta;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Services;54,55 Ceuta;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total Enterprises;61,54 Ceuta;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Industry;0 Ceuta;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Construction;. Ceuta;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Services;72,73 Ceuta;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total Enterprises;0 Ceuta;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Industry;0 Ceuta;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Construction;. Ceuta;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Services;0 Ceuta;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total Enterprises;0 Ceuta;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Industry;0 Ceuta;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Construction;. Ceuta;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Services;0 Melilla;H.1 % of enterprises that apply some ICT security measure (0);Total Enterprises;83,28 Melilla;H.1 % of enterprises that apply some ICT security measure (0);Industry;77,78 Melilla;H.1 % of enterprises that apply some ICT security measure (0);Construction;92,09 Melilla;H.1 % of enterprises that apply some ICT security measure (0);Services;81,36 Melilla;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Total Enterprises;73,31 Melilla;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Industry;100 Melilla;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Construction;92,7 Melilla;H.1.A % of enterprises that apply strong password authentication as an ICT security measure (1);Services;64,36 Melilla;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Total Enterprises;16,79 Melilla;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Industry;0 Melilla;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Construction;9,88 Melilla;H.1.B % of enterprises that apply authentication using biometric methods as an ICT security measure (1);Services;20,73 Melilla;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Total Enterprises;17,54 Melilla;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Industry;35,71 Melilla;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Construction;12,03 Melilla;H.1.C % of enterprises applying authentication based on a combination of at least two authentication mechanisms as an ICT security measure (1);Services;17,45 Melilla;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Total Enterprises;20,99 Melilla;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Industry;35,71 Melilla;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Construction;27,31 Melilla;H.1.D % of enterprises that apply encryption of data, documents or emails as an ICT security measure (1);Services;17,45 Melilla;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Total Enterprises;78,76 Melilla;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Industry;100 Melilla;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Construction;80,63 Melilla;H.1.E % of enterprises that apply data backup in a separate location as an ICT security measure (1);Services;76 Melilla;H.1.F % of enterprises applying network access control as an ICT security measure (1);Total Enterprises;49,86 Melilla;H.1.F % of enterprises applying network access control as an ICT security measure (1);Industry;50 Melilla;H.1.F % of enterprises applying network access control as an ICT security measure (1);Construction;39,77 Melilla;H.1.F % of enterprises applying network access control as an ICT security measure (1);Services;53,09 Melilla;H.1.G % of enterprises applying VPN as an ICT security measure (1);Total Enterprises;32,3 Melilla;H.1.G % of enterprises applying VPN as an ICT security measure (1);Industry;35,71 Melilla;H.1.G % of enterprises applying VPN as an ICT security measure (1);Construction;38,95 Melilla;H.1.G % of enterprises applying VPN as an ICT security measure (1);Services;29,82 Melilla;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Total Enterprises;20,31 Melilla;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Industry;35,71 Melilla;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Construction;24,31 Melilla;H.1.H % of enterprises that apply an ICT security monitoring system that allows suspicious activity to be detected as an ICT security measure (1);Services;17,45 Melilla;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Total Enterprises;17,44 Melilla;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Industry;35,71 Melilla;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Construction;20,66 Melilla;H.1.I % of enterprises that implement log file maintenance that allows analysis after ICT security incidents as an ICT security measure (1);Services;14,55 Melilla;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Total Enterprises;14,96 Melilla;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Industry;50 Melilla;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Construction;5,15 Melilla;H.1.J % of enterprises that implement an ICT risk assessment as an ICT security measure (1);Services;14,55 Melilla;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Total Enterprises;14,03 Melilla;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Industry;35,71 Melilla;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Construction;10,09 Melilla;H.1.K % of enterprises that perform ICT security testing as an ICT security measure (1);Services;13,09 Melilla;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Total Enterprises;36,21 Melilla;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Industry;57,14 Melilla;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Construction;26,85 Melilla;H.2 % of enterprises that make their employees aware of their ICT security obligations (1);Services;37,09 Melilla;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Total Enterprises;67,16 Melilla;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Industry;62,5 Melilla;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Construction;64 Melilla;H.2.A % of enterprises offering voluntary training or providing internally available information to make their employees aware of their ICT security obligations (2);Services;68,63 Melilla;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Total Enterprises;59,38 Melilla;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Industry;62,5 Melilla;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Construction;34,4 Melilla;H.2.B % of enterprises that require mandatory training courses or viewing of material for their employees to make them aware of their ICT security obligations (2);Services;64,71 Melilla;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Total Enterprises;28,07 Melilla;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Industry;100 Melilla;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Construction;32,8 Melilla;H.2.C % of enterprises that contractually make their employees aware of their ICT security obligations (2);Services;15,69 Melilla;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Total Enterprises;13,59 Melilla;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Industry;27,78 Melilla;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Construction;10,28 Melilla;H.3 % of enterprises that have documents on ICT security measures, practices or procedures (0);Services;13,02 Melilla;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Total Enterprises;75,86 Melilla;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Industry;100 Melilla;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Construction;65,38 Melilla;H.4.A % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures in the last 12 months (3);Services;72,73 Melilla;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Total Enterprises;16,98 Melilla;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Industry;0 Melilla;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Construction;28,85 Melilla;H.4.B % of enterprises that defined or last reviewed their documents on ICT security measures, practices or procedures more than 12 months ago and up to 24 months ago (3);Services;18,18 Melilla;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Total Enterprises;7,15 Melilla;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Industry;0 Melilla;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Construction;5,77 Melilla;H.4.C % of enterprises that defined or carried out the latest review of their documents on ICT security measures, practices or procedures more than 24 months ago (3);Services;9,09 Melilla;H.5 % of enterprises that have experienced an ICT security incident (0);Total Enterprises;7,43 Melilla;H.5 % of enterprises that have experienced an ICT security incident (0);Industry;16,67 Melilla;H.5 % of enterprises that have experienced an ICT security incident (0);Construction;17,64 Melilla;H.5 % of enterprises that have experienced an ICT security incident (0);Services;3,55 Melilla;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Total Enterprises;53,12 Melilla;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Industry;100 Melilla;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Construction;26,91 Melilla;H.5.A % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to hardware or software failures (4);Services;66,67 Melilla;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Total Enterprises;44,7 Melilla;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Industry;0 Melilla;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Construction;68,6 Melilla;H.5.B % of enterprises that, after experiencing an ICT security incident, suffered a resulting lack of availability of ICT services due to an attack from outside (4);Services;33,33 Melilla;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Total Enterprises;14,17 Melilla;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Industry;0 Melilla;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Construction;5,61 Melilla;H.5.C % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to hardware or software failures (4);Services;33,33 Melilla;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Total Enterprises;15,8 Melilla;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Industry;0 Melilla;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Construction;8,97 Melilla;H.5.D % of enterprises that, after experiencing an ICT security incident, this resulted in the destruction or corruption of data due to malware infection or unauthorised intrusion (4);Services;33,33 Melilla;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Total Enterprises;0 Melilla;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Industry;0 Melilla;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Construction;0 Melilla;H.5.E % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to intrusions, pharming, phishing or intentional actions of the employees themselves (4);Services;0 Melilla;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Total Enterprises;0,54 Melilla;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Industry;0 Melilla;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Construction;1,12 Melilla;H.5.F % of enterprises that, after experiencing an ICT security incident, this resulted in the disclosure of confidential data due to the involuntary actions of the employees themselves (4);Services;0