Activity grouping (except CNAE 56, 64-66 and 95.1) Main variables Size of the enterprise Total Total Enterprises K.1 % of enterprises that use internal security systems Total 87,31 Total Enterprises K.1 % of enterprises that use internal security systems From 10 to 49 85,81 Total Enterprises K.1 % of enterprises that use internal security systems From 50 to 249 93,94 Total Enterprises K.1 % of enterprises that use internal security systems 250 or more 97,09 Total Enterprises K.1.A % of enterprises that apply strong password authentication (1) Total 92,74 Total Enterprises K.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 91,84 Total Enterprises K.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 96,28 Total Enterprises K.1.A % of enterprises that apply strong password authentication (1) 250 or more 98,44 Total Enterprises K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 52,29 Total Enterprises K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 52,03 Total Enterprises K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 52,81 Total Enterprises K.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 56,62 Total Enterprises K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 13,59 Total Enterprises K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 10,95 Total Enterprises K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 23,15 Total Enterprises K.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 34,54 Total Enterprises K.1.D % of enterprises that use external data backup (1) Total 61,87 Total Enterprises K.1.D % of enterprises that use external data backup (1) From 10 to 49 59,62 Total Enterprises K.1.D % of enterprises that use external data backup (1) From 50 to 249 70,57 Total Enterprises K.1.D % of enterprises that use external data backup (1) 250 or more 76,87 Total Enterprises K.1.E % of enterprises that use protocols to analyze security incidents (1) Total 38,9 Total Enterprises K.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 34,91 Total Enterprises K.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 53,09 Total Enterprises K.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 71,84 1. Total Industry (CNAE 10-39) K.1 % of enterprises that use internal security systems Total 86,79 1. Total Industry (CNAE 10-39) K.1 % of enterprises that use internal security systems From 10 to 49 84,37 1. Total Industry (CNAE 10-39) K.1 % of enterprises that use internal security systems From 50 to 249 95,91 1. Total Industry (CNAE 10-39) K.1 % of enterprises that use internal security systems 250 or more 99,18 1. Total Industry (CNAE 10-39) K.1.A % of enterprises that apply strong password authentication (1) Total 91,21 1. Total Industry (CNAE 10-39) K.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 89,49 1. Total Industry (CNAE 10-39) K.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 96,8 1. Total Industry (CNAE 10-39) K.1.A % of enterprises that apply strong password authentication (1) 250 or more 99,26 1. Total Industry (CNAE 10-39) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 52,4 1. Total Industry (CNAE 10-39) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 51,69 1. Total Industry (CNAE 10-39) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 54,32 1. Total Industry (CNAE 10-39) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 57,89 1. Total Industry (CNAE 10-39) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 14,39 1. Total Industry (CNAE 10-39) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 10,79 1. Total Industry (CNAE 10-39) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 24,93 1. Total Industry (CNAE 10-39) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 37,34 1. Total Industry (CNAE 10-39) K.1.D % of enterprises that use external data backup (1) Total 60,59 1. Total Industry (CNAE 10-39) K.1.D % of enterprises that use external data backup (1) From 10 to 49 57,77 1. Total Industry (CNAE 10-39) K.1.D % of enterprises that use external data backup (1) From 50 to 249 69,42 1. Total Industry (CNAE 10-39) K.1.D % of enterprises that use external data backup (1) 250 or more 75,39 1. Total Industry (CNAE 10-39) K.1.E % of enterprises that use protocols to analyze security incidents (1) Total 36 1. Total Industry (CNAE 10-39) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 30,63 1. Total Industry (CNAE 10-39) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 51,18 1. Total Industry (CNAE 10-39) K.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 73,39 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) K.1 % of enterprises that use internal security systems Total 82,2 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) K.1 % of enterprises that use internal security systems From 10 to 49 79,56 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) K.1 % of enterprises that use internal security systems From 50 to 249 93,81 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) K.1 % of enterprises that use internal security systems 250 or more 98,96 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) K.1.A % of enterprises that apply strong password authentication (1) Total 89,93 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) K.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 87,77 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) K.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 98,28 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) K.1.A % of enterprises that apply strong password authentication (1) 250 or more 99,01 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 55,42 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 54,76 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 58,26 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 56,35 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 14,36 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 10,49 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 28,08 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 39,12 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) K.1.D % of enterprises that use external data backup (1) Total 56,11 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) K.1.D % of enterprises that use external data backup (1) From 10 to 49 53,18 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) K.1.D % of enterprises that use external data backup (1) From 50 to 249 66,03 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) K.1.D % of enterprises that use external data backup (1) 250 or more 77,57 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) K.1.E % of enterprises that use protocols to analyze security incidents (1) Total 29,94 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 24,64 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 48,76 1.1. Food, beverages, tobacco, textile, clothing, leather and footwear, wood and cork, paper, graphic arts and reproduction of recorded media (CNAE 10-18) K.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 63,27 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) K.1 % of enterprises that use internal security systems Total 90,15 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) K.1 % of enterprises that use internal security systems From 10 to 49 87,43 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) K.1 % of enterprises that use internal security systems From 50 to 249 97,21 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) K.1 % of enterprises that use internal security systems 250 or more 100 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) K.1.A % of enterprises that apply strong password authentication (1) Total 92,33 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) K.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 90,4 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) K.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 96,53 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) K.1.A % of enterprises that apply strong password authentication (1) 250 or more 100 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 47,44 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 45,19 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 51,52 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 60,64 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 17,11 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 12,09 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 27,94 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 37,56 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) K.1.D % of enterprises that use external data backup (1) Total 71,22 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) K.1.D % of enterprises that use external data backup (1) From 10 to 49 69,14 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) K.1.D % of enterprises that use external data backup (1) From 50 to 249 76,68 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) K.1.D % of enterprises that use external data backup (1) 250 or more 74,79 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) K.1.E % of enterprises that use protocols to analyze security incidents (1) Total 45,72 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 40,38 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 55,28 1.2 Coke and petroleum refining pharmaceutical products rubber and plastics non-metallic mineral products (CNAE 19-23) K.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 77,51 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) K.1 % of enterprises that use internal security systems Total 86,35 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) K.1 % of enterprises that use internal security systems From 10 to 49 84,74 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) K.1 % of enterprises that use internal security systems From 50 to 249 94,92 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) K.1 % of enterprises that use internal security systems 250 or more 98,97 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) K.1.A % of enterprises that apply strong password authentication (1) Total 90,11 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) K.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 88,99 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) K.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 95,53 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) K.1.A % of enterprises that apply strong password authentication (1) 250 or more 96,88 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 54,85 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 55,02 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 53,87 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 54,6 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 11,41 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 8,92 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 22,43 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 34,07 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) K.1.D % of enterprises that use external data backup (1) Total 57,08 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) K.1.D % of enterprises that use external data backup (1) From 10 to 49 55,13 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) K.1.D % of enterprises that use external data backup (1) From 50 to 249 66,75 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) K.1.D % of enterprises that use external data backup (1) 250 or more 67,12 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) K.1.E % of enterprises that use protocols to analyze security incidents (1) Total 31,02 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 27 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 48,59 1.3 Metallurgy, manufacture of metallic products (CNAE 24-25) K.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 69,48 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) K.1 % of enterprises that use internal security systems Total 91,41 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) K.1 % of enterprises that use internal security systems From 10 to 49 89,65 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) K.1 % of enterprises that use internal security systems From 50 to 249 97,33 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) K.1 % of enterprises that use internal security systems 250 or more 99,28 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) K.1.A % of enterprises that apply strong password authentication (1) Total 92,42 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) K.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 91,17 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) K.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 95,78 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) K.1.A % of enterprises that apply strong password authentication (1) 250 or more 100 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 50,21 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 49,08 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 52,88 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 58,75 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 14,64 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 11,72 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 22,52 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 32,06 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) K.1.D % of enterprises that use external data backup (1) Total 62,59 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) K.1.D % of enterprises that use external data backup (1) From 10 to 49 59,67 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) K.1.D % of enterprises that use external data backup (1) From 50 to 249 71,34 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) K.1.D % of enterprises that use external data backup (1) 250 or more 75,9 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) K.1.E % of enterprises that use protocols to analyze security incidents (1) Total 40,33 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 35,5 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 51,31 1.4. Computer, electronic and optical products electric equipment, machinery and mechanical equipment motor vehicles transport material furniture manufacturing industry, repair of machinery and equipment (CNAE 26-33) K.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 79,09 1.5. Energy and water (CNAE 35-39) K.1 % of enterprises that use internal security systems Total 91,18 1.5. Energy and water (CNAE 35-39) K.1 % of enterprises that use internal security systems From 10 to 49 88,05 1.5. Energy and water (CNAE 35-39) K.1 % of enterprises that use internal security systems From 50 to 249 99,71 1.5. Energy and water (CNAE 35-39) K.1 % of enterprises that use internal security systems 250 or more 98,27 1.5. Energy and water (CNAE 35-39) K.1.A % of enterprises that apply strong password authentication (1) Total 94,4 1.5. Energy and water (CNAE 35-39) K.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 93,21 1.5. Energy and water (CNAE 35-39) K.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 96,61 1.5. Energy and water (CNAE 35-39) K.1.A % of enterprises that apply strong password authentication (1) 250 or more 98,77 1.5. Energy and water (CNAE 35-39) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 48,82 1.5. Energy and water (CNAE 35-39) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 47,74 1.5. Energy and water (CNAE 35-39) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 49,3 1.5. Energy and water (CNAE 35-39) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 57,5 1.5. Energy and water (CNAE 35-39) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 15,2 1.5. Energy and water (CNAE 35-39) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 11,8 1.5. Energy and water (CNAE 35-39) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 14,81 1.5. Energy and water (CNAE 35-39) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 48,3 1.5. Energy and water (CNAE 35-39) K.1.D % of enterprises that use external data backup (1) Total 62,23 1.5. Energy and water (CNAE 35-39) K.1.D % of enterprises that use external data backup (1) From 10 to 49 60,26 1.5. Energy and water (CNAE 35-39) K.1.D % of enterprises that use external data backup (1) From 50 to 249 63,39 1.5. Energy and water (CNAE 35-39) K.1.D % of enterprises that use external data backup (1) 250 or more 77,08 1.5. Energy and water (CNAE 35-39) K.1.E % of enterprises that use protocols to analyze security incidents (1) Total 44,5 1.5. Energy and water (CNAE 35-39) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 36,99 1.5. Energy and water (CNAE 35-39) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 56,05 1.5. Energy and water (CNAE 35-39) K.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 79,51 2. Total Construction (CNAE 41-43) K.1 % of enterprises that use internal security systems Total 81,28 2. Total Construction (CNAE 41-43) K.1 % of enterprises that use internal security systems From 10 to 49 80,58 2. Total Construction (CNAE 41-43) K.1 % of enterprises that use internal security systems From 50 to 249 86,21 2. Total Construction (CNAE 41-43) K.1 % of enterprises that use internal security systems 250 or more 96,48 2. Total Construction (CNAE 41-43) K.1.A % of enterprises that apply strong password authentication (1) Total 93,45 2. Total Construction (CNAE 41-43) K.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 93,29 2. Total Construction (CNAE 41-43) K.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 94,18 2. Total Construction (CNAE 41-43) K.1.A % of enterprises that apply strong password authentication (1) 250 or more 100 2. Total Construction (CNAE 41-43) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 50,8 2. Total Construction (CNAE 41-43) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 51,38 2. Total Construction (CNAE 41-43) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 46,73 2. Total Construction (CNAE 41-43) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 43,72 2. Total Construction (CNAE 41-43) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 7,06 2. Total Construction (CNAE 41-43) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 5,62 2. Total Construction (CNAE 41-43) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 16,71 2. Total Construction (CNAE 41-43) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 31,89 2. Total Construction (CNAE 41-43) K.1.D % of enterprises that use external data backup (1) Total 52,74 2. Total Construction (CNAE 41-43) K.1.D % of enterprises that use external data backup (1) From 10 to 49 51,04 2. Total Construction (CNAE 41-43) K.1.D % of enterprises that use external data backup (1) From 50 to 249 64,22 2. Total Construction (CNAE 41-43) K.1.D % of enterprises that use external data backup (1) 250 or more 80,64 2. Total Construction (CNAE 41-43) K.1.E % of enterprises that use protocols to analyze security incidents (1) Total 31,03 2. Total Construction (CNAE 41-43) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 28,94 2. Total Construction (CNAE 41-43) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 44,75 2. Total Construction (CNAE 41-43) K.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 70,44 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) K.1 % of enterprises that use internal security systems Total 88,88 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) K.1 % of enterprises that use internal security systems From 10 to 49 87,7 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) K.1 % of enterprises that use internal security systems From 50 to 249 94,11 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) K.1 % of enterprises that use internal security systems 250 or more 96,19 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) K.1.A % of enterprises that apply strong password authentication (1) Total 93,27 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) K.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 92,5 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) K.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 96,31 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) K.1.A % of enterprises that apply strong password authentication (1) 250 or more 97,97 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 52,55 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 52,31 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 52,87 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 56,78 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 14,58 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 12,21 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 23,12 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 33,39 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) K.1.D % of enterprises that use external data backup (1) Total 64,3 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) K.1.D % of enterprises that use external data backup (1) From 10 to 49 62,3 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) K.1.D % of enterprises that use external data backup (1) From 50 to 249 72,11 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) K.1.D % of enterprises that use external data backup (1) 250 or more 77,34 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) K.1.E % of enterprises that use protocols to analyze security incidents (1) Total 41,78 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 38,03 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 55,33 3. Total Services (CNAE 45-82, excluding CNAE 56: food and drink services, CNAE 75 and financial services) K.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 71,2 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) K.1 % of enterprises that use internal security systems Total 88,85 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) K.1 % of enterprises that use internal security systems From 10 to 49 87,77 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) K.1 % of enterprises that use internal security systems From 50 to 249 95,01 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) K.1 % of enterprises that use internal security systems 250 or more 97,43 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) K.1.A % of enterprises that apply strong password authentication (1) Total 92,74 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) K.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 92,09 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) K.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 96,12 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) K.1.A % of enterprises that apply strong password authentication (1) 250 or more 97,54 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 52,85 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 53,04 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 51,45 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 53,59 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 11,13 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 8,89 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 21,13 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 36,88 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) K.1.D % of enterprises that use external data backup (1) Total 62,66 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) K.1.D % of enterprises that use external data backup (1) From 10 to 49 60,78 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) K.1.D % of enterprises that use external data backup (1) From 50 to 249 72,41 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) K.1.D % of enterprises that use external data backup (1) 250 or more 76,62 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) K.1.E % of enterprises that use protocols to analyze security incidents (1) Total 37,05 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 33,51 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 54,17 3.1. Sale and repair of motor vehicles, wholesale and retail (CNAE 45-47) K.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 70,16 3.2. Transport and storage (CNAE 49-53) K.1 % of enterprises that use internal security systems Total 86,66 3.2. Transport and storage (CNAE 49-53) K.1 % of enterprises that use internal security systems From 10 to 49 84,6 3.2. Transport and storage (CNAE 49-53) K.1 % of enterprises that use internal security systems From 50 to 249 96,29 3.2. Transport and storage (CNAE 49-53) K.1 % of enterprises that use internal security systems 250 or more 100 3.2. Transport and storage (CNAE 49-53) K.1.A % of enterprises that apply strong password authentication (1) Total 91,63 3.2. Transport and storage (CNAE 49-53) K.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 90,19 3.2. Transport and storage (CNAE 49-53) K.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 97,54 3.2. Transport and storage (CNAE 49-53) K.1.A % of enterprises that apply strong password authentication (1) 250 or more 99,53 3.2. Transport and storage (CNAE 49-53) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 50,74 3.2. Transport and storage (CNAE 49-53) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 49,42 3.2. Transport and storage (CNAE 49-53) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 57,28 3.2. Transport and storage (CNAE 49-53) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 51,71 3.2. Transport and storage (CNAE 49-53) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 11,36 3.2. Transport and storage (CNAE 49-53) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 8,28 3.2. Transport and storage (CNAE 49-53) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 22,5 3.2. Transport and storage (CNAE 49-53) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 36,43 3.2. Transport and storage (CNAE 49-53) K.1.D % of enterprises that use external data backup (1) Total 54,51 3.2. Transport and storage (CNAE 49-53) K.1.D % of enterprises that use external data backup (1) From 10 to 49 50,68 3.2. Transport and storage (CNAE 49-53) K.1.D % of enterprises that use external data backup (1) From 50 to 249 70,48 3.2. Transport and storage (CNAE 49-53) K.1.D % of enterprises that use external data backup (1) 250 or more 73,93 3.2. Transport and storage (CNAE 49-53) K.1.E % of enterprises that use protocols to analyze security incidents (1) Total 35,31 3.2. Transport and storage (CNAE 49-53) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 29,98 3.2. Transport and storage (CNAE 49-53) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 55,16 3.2. Transport and storage (CNAE 49-53) K.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 75,64 3.3. Accommodation services (CNAE 55) K.1 % of enterprises that use internal security systems Total 93,72 3.3. Accommodation services (CNAE 55) K.1 % of enterprises that use internal security systems From 10 to 49 92,4 3.3. Accommodation services (CNAE 55) K.1 % of enterprises that use internal security systems From 50 to 249 97,91 3.3. Accommodation services (CNAE 55) K.1 % of enterprises that use internal security systems 250 or more 98,38 3.3. Accommodation services (CNAE 55) K.1.A % of enterprises that apply strong password authentication (1) Total 94,63 3.3. Accommodation services (CNAE 55) K.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 94,44 3.3. Accommodation services (CNAE 55) K.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 94,73 3.3. Accommodation services (CNAE 55) K.1.A % of enterprises that apply strong password authentication (1) 250 or more 98,33 3.3. Accommodation services (CNAE 55) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 54,68 3.3. Accommodation services (CNAE 55) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 55,58 3.3. Accommodation services (CNAE 55) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 53,67 3.3. Accommodation services (CNAE 55) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 41,01 3.3. Accommodation services (CNAE 55) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 13,61 3.3. Accommodation services (CNAE 55) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 12,51 3.3. Accommodation services (CNAE 55) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 15,86 3.3. Accommodation services (CNAE 55) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 23,98 3.3. Accommodation services (CNAE 55) K.1.D % of enterprises that use external data backup (1) Total 55,57 3.3. Accommodation services (CNAE 55) K.1.D % of enterprises that use external data backup (1) From 10 to 49 51,19 3.3. Accommodation services (CNAE 55) K.1.D % of enterprises that use external data backup (1) From 50 to 249 68,11 3.3. Accommodation services (CNAE 55) K.1.D % of enterprises that use external data backup (1) 250 or more 73,94 3.3. Accommodation services (CNAE 55) K.1.E % of enterprises that use protocols to analyze security incidents (1) Total 42,01 3.3. Accommodation services (CNAE 55) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 37,88 3.3. Accommodation services (CNAE 55) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 54,09 3.3. Accommodation services (CNAE 55) K.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 57,7 3.4. Information and communications (CNAE 58-63) K.1 % of enterprises that use internal security systems Total 96,44 3.4. Information and communications (CNAE 58-63) K.1 % of enterprises that use internal security systems From 10 to 49 96,06 3.4. Information and communications (CNAE 58-63) K.1 % of enterprises that use internal security systems From 50 to 249 97,11 3.4. Information and communications (CNAE 58-63) K.1 % of enterprises that use internal security systems 250 or more 100 3.4. Information and communications (CNAE 58-63) K.1.A % of enterprises that apply strong password authentication (1) Total 96,54 3.4. Information and communications (CNAE 58-63) K.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 95,69 3.4. Information and communications (CNAE 58-63) K.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 99,33 3.4. Information and communications (CNAE 58-63) K.1.A % of enterprises that apply strong password authentication (1) 250 or more 99 3.4. Information and communications (CNAE 58-63) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 56,84 3.4. Information and communications (CNAE 58-63) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 55,98 3.4. Information and communications (CNAE 58-63) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 58,03 3.4. Information and communications (CNAE 58-63) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 65,63 3.4. Information and communications (CNAE 58-63) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 26,05 3.4. Information and communications (CNAE 58-63) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 22,94 3.4. Information and communications (CNAE 58-63) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 36,95 3.4. Information and communications (CNAE 58-63) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 32,49 3.4. Information and communications (CNAE 58-63) K.1.D % of enterprises that use external data backup (1) Total 78,01 3.4. Information and communications (CNAE 58-63) K.1.D % of enterprises that use external data backup (1) From 10 to 49 76,81 3.4. Information and communications (CNAE 58-63) K.1.D % of enterprises that use external data backup (1) From 50 to 249 80,8 3.4. Information and communications (CNAE 58-63) K.1.D % of enterprises that use external data backup (1) 250 or more 85,91 3.4. Information and communications (CNAE 58-63) K.1.E % of enterprises that use protocols to analyze security incidents (1) Total 65,5 3.4. Information and communications (CNAE 58-63) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 61,22 3.4. Information and communications (CNAE 58-63) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 76,71 3.4. Information and communications (CNAE 58-63) K.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 89,1 3.5. Real estate activities (CNAE 68) K.1 % of enterprises that use internal security systems Total 83,01 3.5. Real estate activities (CNAE 68) K.1 % of enterprises that use internal security systems From 10 to 49 80,74 3.5. Real estate activities (CNAE 68) K.1 % of enterprises that use internal security systems From 50 to 249 98,45 3.5. Real estate activities (CNAE 68) K.1 % of enterprises that use internal security systems 250 or more 95,67 3.5. Real estate activities (CNAE 68) K.1.A % of enterprises that apply strong password authentication (1) Total 92,56 3.5. Real estate activities (CNAE 68) K.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 91,32 3.5. Real estate activities (CNAE 68) K.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 100 3.5. Real estate activities (CNAE 68) K.1.A % of enterprises that apply strong password authentication (1) 250 or more 95,47 3.5. Real estate activities (CNAE 68) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 49,92 3.5. Real estate activities (CNAE 68) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 51,61 3.5. Real estate activities (CNAE 68) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 37,51 3.5. Real estate activities (CNAE 68) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 59,04 3.5. Real estate activities (CNAE 68) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 14,8 3.5. Real estate activities (CNAE 68) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 12,38 3.5. Real estate activities (CNAE 68) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 24,09 3.5. Real estate activities (CNAE 68) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 49,98 3.5. Real estate activities (CNAE 68) K.1.D % of enterprises that use external data backup (1) Total 66,04 3.5. Real estate activities (CNAE 68) K.1.D % of enterprises that use external data backup (1) From 10 to 49 65,36 3.5. Real estate activities (CNAE 68) K.1.D % of enterprises that use external data backup (1) From 50 to 249 71,23 3.5. Real estate activities (CNAE 68) K.1.D % of enterprises that use external data backup (1) 250 or more 60,89 3.5. Real estate activities (CNAE 68) K.1.E % of enterprises that use protocols to analyze security incidents (1) Total 48,52 3.5. Real estate activities (CNAE 68) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 47,36 3.5. Real estate activities (CNAE 68) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 49,82 3.5. Real estate activities (CNAE 68) K.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 83,74 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) K.1 % of enterprises that use internal security systems Total 93,9 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) K.1 % of enterprises that use internal security systems From 10 to 49 93,48 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) K.1 % of enterprises that use internal security systems From 50 to 249 95,4 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) K.1 % of enterprises that use internal security systems 250 or more 99,3 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) K.1.A % of enterprises that apply strong password authentication (1) Total 96,15 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) K.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 95,75 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) K.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 98,01 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) K.1.A % of enterprises that apply strong password authentication (1) 250 or more 99,28 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 57,72 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 58,26 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 53,48 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 60,65 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 23,58 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 21,21 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 36,65 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 33,07 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) K.1.D % of enterprises that use external data backup (1) Total 76,52 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) K.1.D % of enterprises that use external data backup (1) From 10 to 49 75,52 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) K.1.D % of enterprises that use external data backup (1) From 50 to 249 82 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) K.1.D % of enterprises that use external data backup (1) 250 or more 80,78 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) K.1.E % of enterprises that use protocols to analyze security incidents (1) Total 55,15 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 52,06 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 69,02 3.6. Professional, scientific and technical activities (excl. veterinary) (CNAE 69-74) K.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 80,73 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) K.1 % of enterprises that use internal security systems Total 81,5 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) K.1 % of enterprises that use internal security systems From 10 to 49 79,54 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) K.1 % of enterprises that use internal security systems From 50 to 249 86,7 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) K.1 % of enterprises that use internal security systems 250 or more 90,12 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) K.1.A % of enterprises that apply strong password authentication (1) Total 91,04 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) K.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 89,88 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) K.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 93,5 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) K.1.A % of enterprises that apply strong password authentication (1) 250 or more 96,72 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 44,71 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 41,84 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 50,19 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 60,51 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 13,1 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 11,19 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 14,58 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 30,28 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) K.1.D % of enterprises that use external data backup (1) Total 61,9 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) K.1.D % of enterprises that use external data backup (1) From 10 to 49 60,31 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) K.1.D % of enterprises that use external data backup (1) From 50 to 249 63,27 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) K.1.D % of enterprises that use external data backup (1) 250 or more 75,78 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) K.1.E % of enterprises that use protocols to analyze security incidents (1) Total 34,75 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 31,53 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 38,15 3.7. Administrative and support service activities (incl. travel agencies) (CNAE 77-82) K.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 60,94 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) K.1 % of enterprises that use internal security systems Total 95,89 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) K.1 % of enterprises that use internal security systems From 10 to 49 95,57 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) K.1 % of enterprises that use internal security systems From 50 to 249 96,45 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) K.1 % of enterprises that use internal security systems 250 or more 98,91 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) K.1.A % of enterprises that apply strong password authentication (1) Total 96,61 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) K.1.A % of enterprises that apply strong password authentication (1) From 10 to 49 96,29 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) K.1.A % of enterprises that apply strong password authentication (1) From 50 to 249 97,4 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) K.1.A % of enterprises that apply strong password authentication (1) 250 or more 98,43 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total 55,05 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 10 to 49 54,54 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) From 50 to 249 54,48 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) K.1.B % of enterprises that use user identification and authentication with hardware elements (1) 250 or more 65,51 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total 25,44 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 10 to 49 23,52 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) From 50 to 249 30,97 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) K.1.C % of enterprises that use user identification and authentication with biometric elements (1) 250 or more 33,98 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) K.1.D % of enterprises that use external data backup (1) Total 76,76 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) K.1.D % of enterprises that use external data backup (1) From 10 to 49 75,07 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) K.1.D % of enterprises that use external data backup (1) From 50 to 249 82,72 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) K.1.D % of enterprises that use external data backup (1) 250 or more 79,91 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) K.1.E % of enterprises that use protocols to analyze security incidents (1) Total 69,7 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 10 to 49 66,07 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) K.1.E % of enterprises that use protocols to analyze security incidents (1) From 50 to 249 79,27 4. Sector ICT (261-264, 268, 465, 582, 61, 6201, 6202, 6203, 6209, 631, 951) K.1.E % of enterprises that use protocols to analyze security incidents (1) 250 or more 89,31