Autonomous communities and cities Main variables Economic activity cluster Total National total K.1 % of enterprises that use internal security systems Total Enterprises 87,31 National total K.1 % of enterprises that use internal security systems Industry 86,79 National total K.1 % of enterprises that use internal security systems Construction 81,28 National total K.1 % of enterprises that use internal security systems Services 88,88 National total K.1.A % of enterprises that apply strong password authentication (1) Total Enterprises 92,74 National total K.1.A % of enterprises that apply strong password authentication (1) Industry 91,21 National total K.1.A % of enterprises that apply strong password authentication (1) Construction 93,45 National total K.1.A % of enterprises that apply strong password authentication (1) Services 93,27 National total K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total Enterprises 52,29 National total K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Industry 52,4 National total K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Construction 50,8 National total K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Services 52,55 National total K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total Enterprises 13,59 National total K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Industry 14,39 National total K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Construction 7,06 National total K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Services 14,58 National total K.1.D % of enterprises that use external data backup (1) Total Enterprises 61,87 National total K.1.D % of enterprises that use external data backup (1) Industry 60,59 National total K.1.D % of enterprises that use external data backup (1) Construction 52,74 National total K.1.D % of enterprises that use external data backup (1) Services 64,3 National total K.1.E % of enterprises that use protocols to analyze security incidents (1) Total Enterprises 38,9 National total K.1.E % of enterprises that use protocols to analyze security incidents (1) Industry 36 National total K.1.E % of enterprises that use protocols to analyze security incidents (1) Construction 31,03 National total K.1.E % of enterprises that use protocols to analyze security incidents (1) Services 41,78 Andalucía K.1 % of enterprises that use internal security systems Total Enterprises 87,7 Andalucía K.1 % of enterprises that use internal security systems Industry 86,8 Andalucía K.1 % of enterprises that use internal security systems Construction 84,62 Andalucía K.1 % of enterprises that use internal security systems Services 88,84 Andalucía K.1.A % of enterprises that apply strong password authentication (1) Total Enterprises 92,85 Andalucía K.1.A % of enterprises that apply strong password authentication (1) Industry 87,83 Andalucía K.1.A % of enterprises that apply strong password authentication (1) Construction 96,73 Andalucía K.1.A % of enterprises that apply strong password authentication (1) Services 93,55 Andalucía K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total Enterprises 50,61 Andalucía K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Industry 49,38 Andalucía K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Construction 49,08 Andalucía K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Services 51,41 Andalucía K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total Enterprises 10,65 Andalucía K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Industry 11,71 Andalucía K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Construction 1,55 Andalucía K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Services 12,61 Andalucía K.1.D % of enterprises that use external data backup (1) Total Enterprises 46,57 Andalucía K.1.D % of enterprises that use external data backup (1) Industry 45,06 Andalucía K.1.D % of enterprises that use external data backup (1) Construction 29,73 Andalucía K.1.D % of enterprises that use external data backup (1) Services 51,36 Andalucía K.1.E % of enterprises that use protocols to analyze security incidents (1) Total Enterprises 30,03 Andalucía K.1.E % of enterprises that use protocols to analyze security incidents (1) Industry 27,5 Andalucía K.1.E % of enterprises that use protocols to analyze security incidents (1) Construction 15,74 Andalucía K.1.E % of enterprises that use protocols to analyze security incidents (1) Services 34,52 Aragón K.1 % of enterprises that use internal security systems Total Enterprises 85,27 Aragón K.1 % of enterprises that use internal security systems Industry 85,14 Aragón K.1 % of enterprises that use internal security systems Construction 75,15 Aragón K.1 % of enterprises that use internal security systems Services 87,87 Aragón K.1.A % of enterprises that apply strong password authentication (1) Total Enterprises 93,39 Aragón K.1.A % of enterprises that apply strong password authentication (1) Industry 92,52 Aragón K.1.A % of enterprises that apply strong password authentication (1) Construction 98,84 Aragón K.1.A % of enterprises that apply strong password authentication (1) Services 92,83 Aragón K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total Enterprises 47,17 Aragón K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Industry 47,44 Aragón K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Construction 50,66 Aragón K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Services 46,23 Aragón K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total Enterprises 14,08 Aragón K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Industry 20,55 Aragón K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Construction 5,91 Aragón K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Services 11,33 Aragón K.1.D % of enterprises that use external data backup (1) Total Enterprises 67,1 Aragón K.1.D % of enterprises that use external data backup (1) Industry 71,16 Aragón K.1.D % of enterprises that use external data backup (1) Construction 76,18 Aragón K.1.D % of enterprises that use external data backup (1) Services 62,36 Aragón K.1.E % of enterprises that use protocols to analyze security incidents (1) Total Enterprises 38,34 Aragón K.1.E % of enterprises that use protocols to analyze security incidents (1) Industry 37,1 Aragón K.1.E % of enterprises that use protocols to analyze security incidents (1) Construction 37,46 Aragón K.1.E % of enterprises that use protocols to analyze security incidents (1) Services 39,38 Asturias, Principado de K.1 % of enterprises that use internal security systems Total Enterprises 89,31 Asturias, Principado de K.1 % of enterprises that use internal security systems Industry 88,25 Asturias, Principado de K.1 % of enterprises that use internal security systems Construction 86,47 Asturias, Principado de K.1 % of enterprises that use internal security systems Services 90,51 Asturias, Principado de K.1.A % of enterprises that apply strong password authentication (1) Total Enterprises 92,62 Asturias, Principado de K.1.A % of enterprises that apply strong password authentication (1) Industry 91,09 Asturias, Principado de K.1.A % of enterprises that apply strong password authentication (1) Construction 92,99 Asturias, Principado de K.1.A % of enterprises that apply strong password authentication (1) Services 93,31 Asturias, Principado de K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total Enterprises 44,69 Asturias, Principado de K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Industry 44,5 Asturias, Principado de K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Construction 36,86 Asturias, Principado de K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Services 46,51 Asturias, Principado de K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total Enterprises 8,76 Asturias, Principado de K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Industry 8,95 Asturias, Principado de K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Construction 8,84 Asturias, Principado de K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Services 8,65 Asturias, Principado de K.1.D % of enterprises that use external data backup (1) Total Enterprises 62,74 Asturias, Principado de K.1.D % of enterprises that use external data backup (1) Industry 57,2 Asturias, Principado de K.1.D % of enterprises that use external data backup (1) Construction 62,64 Asturias, Principado de K.1.D % of enterprises that use external data backup (1) Services 65,54 Asturias, Principado de K.1.E % of enterprises that use protocols to analyze security incidents (1) Total Enterprises 31,7 Asturias, Principado de K.1.E % of enterprises that use protocols to analyze security incidents (1) Industry 29,3 Asturias, Principado de K.1.E % of enterprises that use protocols to analyze security incidents (1) Construction 28,8 Asturias, Principado de K.1.E % of enterprises that use protocols to analyze security incidents (1) Services 33,54 Balears, Illes K.1 % of enterprises that use internal security systems Total Enterprises 89,54 Balears, Illes K.1 % of enterprises that use internal security systems Industry 80,99 Balears, Illes K.1 % of enterprises that use internal security systems Construction 89,22 Balears, Illes K.1 % of enterprises that use internal security systems Services 91,42 Balears, Illes K.1.A % of enterprises that apply strong password authentication (1) Total Enterprises 91,18 Balears, Illes K.1.A % of enterprises that apply strong password authentication (1) Industry 91,61 Balears, Illes K.1.A % of enterprises that apply strong password authentication (1) Construction 84,11 Balears, Illes K.1.A % of enterprises that apply strong password authentication (1) Services 93,56 Balears, Illes K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total Enterprises 47,72 Balears, Illes K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Industry 47,55 Balears, Illes K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Construction 45,15 Balears, Illes K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Services 48,64 Balears, Illes K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total Enterprises 14,19 Balears, Illes K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Industry 9,46 Balears, Illes K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Construction 10,73 Balears, Illes K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Services 16,25 Balears, Illes K.1.D % of enterprises that use external data backup (1) Total Enterprises 60,29 Balears, Illes K.1.D % of enterprises that use external data backup (1) Industry 56,35 Balears, Illes K.1.D % of enterprises that use external data backup (1) Construction 57,34 Balears, Illes K.1.D % of enterprises that use external data backup (1) Services 62,03 Balears, Illes K.1.E % of enterprises that use protocols to analyze security incidents (1) Total Enterprises 36,71 Balears, Illes K.1.E % of enterprises that use protocols to analyze security incidents (1) Industry 34,04 Balears, Illes K.1.E % of enterprises that use protocols to analyze security incidents (1) Construction 32,26 Balears, Illes K.1.E % of enterprises that use protocols to analyze security incidents (1) Services 38,75 Canarias K.1 % of enterprises that use internal security systems Total Enterprises 86,62 Canarias K.1 % of enterprises that use internal security systems Industry 87,73 Canarias K.1 % of enterprises that use internal security systems Construction 80,04 Canarias K.1 % of enterprises that use internal security systems Services 87,83 Canarias K.1.A % of enterprises that apply strong password authentication (1) Total Enterprises 92,8 Canarias K.1.A % of enterprises that apply strong password authentication (1) Industry 94,19 Canarias K.1.A % of enterprises that apply strong password authentication (1) Construction 92,14 Canarias K.1.A % of enterprises that apply strong password authentication (1) Services 92,69 Canarias K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total Enterprises 53,21 Canarias K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Industry 60,34 Canarias K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Construction 57,87 Canarias K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Services 51,09 Canarias K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total Enterprises 12,99 Canarias K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Industry 11,99 Canarias K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Construction 12,05 Canarias K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Services 13,34 Canarias K.1.D % of enterprises that use external data backup (1) Total Enterprises 60,96 Canarias K.1.D % of enterprises that use external data backup (1) Industry 75,58 Canarias K.1.D % of enterprises that use external data backup (1) Construction 50,61 Canarias K.1.D % of enterprises that use external data backup (1) Services 60,48 Canarias K.1.E % of enterprises that use protocols to analyze security incidents (1) Total Enterprises 43,74 Canarias K.1.E % of enterprises that use protocols to analyze security incidents (1) Industry 32,32 Canarias K.1.E % of enterprises that use protocols to analyze security incidents (1) Construction 48,19 Canarias K.1.E % of enterprises that use protocols to analyze security incidents (1) Services 44,83 Cantabria K.1 % of enterprises that use internal security systems Total Enterprises 81,09 Cantabria K.1 % of enterprises that use internal security systems Industry 69,32 Cantabria K.1 % of enterprises that use internal security systems Construction 91,91 Cantabria K.1 % of enterprises that use internal security systems Services 85,22 Cantabria K.1.A % of enterprises that apply strong password authentication (1) Total Enterprises 93,55 Cantabria K.1.A % of enterprises that apply strong password authentication (1) Industry 95,45 Cantabria K.1.A % of enterprises that apply strong password authentication (1) Construction 100 Cantabria K.1.A % of enterprises that apply strong password authentication (1) Services 90,82 Cantabria K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total Enterprises 46,85 Cantabria K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Industry 53,96 Cantabria K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Construction 35,11 Cantabria K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Services 46,73 Cantabria K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total Enterprises 10,83 Cantabria K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Industry 9,43 Cantabria K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Construction 15,41 Cantabria K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Services 10,22 Cantabria K.1.D % of enterprises that use external data backup (1) Total Enterprises 56,72 Cantabria K.1.D % of enterprises that use external data backup (1) Industry 45,6 Cantabria K.1.D % of enterprises that use external data backup (1) Construction 61,28 Cantabria K.1.D % of enterprises that use external data backup (1) Services 60,8 Cantabria K.1.E % of enterprises that use protocols to analyze security incidents (1) Total Enterprises 33,99 Cantabria K.1.E % of enterprises that use protocols to analyze security incidents (1) Industry 31,13 Cantabria K.1.E % of enterprises that use protocols to analyze security incidents (1) Construction 23,98 Cantabria K.1.E % of enterprises that use protocols to analyze security incidents (1) Services 38,19 Castilla y León K.1 % of enterprises that use internal security systems Total Enterprises 84,02 Castilla y León K.1 % of enterprises that use internal security systems Industry 83,43 Castilla y León K.1 % of enterprises that use internal security systems Construction 71,54 Castilla y León K.1 % of enterprises that use internal security systems Services 87,67 Castilla y León K.1.A % of enterprises that apply strong password authentication (1) Total Enterprises 95,31 Castilla y León K.1.A % of enterprises that apply strong password authentication (1) Industry 95,99 Castilla y León K.1.A % of enterprises that apply strong password authentication (1) Construction 100 Castilla y León K.1.A % of enterprises that apply strong password authentication (1) Services 93,92 Castilla y León K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total Enterprises 49,75 Castilla y León K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Industry 54,83 Castilla y León K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Construction 24,61 Castilla y León K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Services 52,28 Castilla y León K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total Enterprises 9,71 Castilla y León K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Industry 8,44 Castilla y León K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Construction 3,72 Castilla y León K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Services 11,71 Castilla y León K.1.D % of enterprises that use external data backup (1) Total Enterprises 52,84 Castilla y León K.1.D % of enterprises that use external data backup (1) Industry 54,88 Castilla y León K.1.D % of enterprises that use external data backup (1) Construction 36,53 Castilla y León K.1.D % of enterprises that use external data backup (1) Services 55,19 Castilla y León K.1.E % of enterprises that use protocols to analyze security incidents (1) Total Enterprises 33,44 Castilla y León K.1.E % of enterprises that use protocols to analyze security incidents (1) Industry 34,12 Castilla y León K.1.E % of enterprises that use protocols to analyze security incidents (1) Construction 13 Castilla y León K.1.E % of enterprises that use protocols to analyze security incidents (1) Services 37,46 Castilla-La Mancha K.1 % of enterprises that use internal security systems Total Enterprises 80,73 Castilla-La Mancha K.1 % of enterprises that use internal security systems Industry 81,02 Castilla-La Mancha K.1 % of enterprises that use internal security systems Construction 70,15 Castilla-La Mancha K.1 % of enterprises that use internal security systems Services 84,32 Castilla-La Mancha K.1.A % of enterprises that apply strong password authentication (1) Total Enterprises 90,96 Castilla-La Mancha K.1.A % of enterprises that apply strong password authentication (1) Industry 87,43 Castilla-La Mancha K.1.A % of enterprises that apply strong password authentication (1) Construction 97,18 Castilla-La Mancha K.1.A % of enterprises that apply strong password authentication (1) Services 91,93 Castilla-La Mancha K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total Enterprises 52,25 Castilla-La Mancha K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Industry 56,1 Castilla-La Mancha K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Construction 56,62 Castilla-La Mancha K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Services 47,83 Castilla-La Mancha K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total Enterprises 11,62 Castilla-La Mancha K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Industry 11,93 Castilla-La Mancha K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Construction 8,58 Castilla-La Mancha K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Services 12,29 Castilla-La Mancha K.1.D % of enterprises that use external data backup (1) Total Enterprises 57,03 Castilla-La Mancha K.1.D % of enterprises that use external data backup (1) Industry 52,8 Castilla-La Mancha K.1.D % of enterprises that use external data backup (1) Construction 55,08 Castilla-La Mancha K.1.D % of enterprises that use external data backup (1) Services 61,02 Castilla-La Mancha K.1.E % of enterprises that use protocols to analyze security incidents (1) Total Enterprises 32,29 Castilla-La Mancha K.1.E % of enterprises that use protocols to analyze security incidents (1) Industry 24,75 Castilla-La Mancha K.1.E % of enterprises that use protocols to analyze security incidents (1) Construction 31,41 Castilla-La Mancha K.1.E % of enterprises that use protocols to analyze security incidents (1) Services 38,64 Cataluña K.1 % of enterprises that use internal security systems Total Enterprises 89,77 Cataluña K.1 % of enterprises that use internal security systems Industry 92,91 Cataluña K.1 % of enterprises that use internal security systems Construction 85,13 Cataluña K.1 % of enterprises that use internal security systems Services 89,14 Cataluña K.1.A % of enterprises that apply strong password authentication (1) Total Enterprises 92,23 Cataluña K.1.A % of enterprises that apply strong password authentication (1) Industry 92,25 Cataluña K.1.A % of enterprises that apply strong password authentication (1) Construction 90,19 Cataluña K.1.A % of enterprises that apply strong password authentication (1) Services 92,54 Cataluña K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total Enterprises 53,64 Cataluña K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Industry 53,25 Cataluña K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Construction 54,77 Cataluña K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Services 53,65 Cataluña K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total Enterprises 14,4 Cataluña K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Industry 15,84 Cataluña K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Construction 8,67 Cataluña K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Services 14,64 Cataluña K.1.D % of enterprises that use external data backup (1) Total Enterprises 71,17 Cataluña K.1.D % of enterprises that use external data backup (1) Industry 66,13 Cataluña K.1.D % of enterprises that use external data backup (1) Construction 61,86 Cataluña K.1.D % of enterprises that use external data backup (1) Services 74,97 Cataluña K.1.E % of enterprises that use protocols to analyze security incidents (1) Total Enterprises 44,23 Cataluña K.1.E % of enterprises that use protocols to analyze security incidents (1) Industry 43,68 Cataluña K.1.E % of enterprises that use protocols to analyze security incidents (1) Construction 35,65 Cataluña K.1.E % of enterprises that use protocols to analyze security incidents (1) Services 45,85 Comunitat Valenciana K.1 % of enterprises that use internal security systems Total Enterprises 85,3 Comunitat Valenciana K.1 % of enterprises that use internal security systems Industry 81,83 Comunitat Valenciana K.1 % of enterprises that use internal security systems Construction 82,46 Comunitat Valenciana K.1 % of enterprises that use internal security systems Services 88,16 Comunitat Valenciana K.1.A % of enterprises that apply strong password authentication (1) Total Enterprises 95,3 Comunitat Valenciana K.1.A % of enterprises that apply strong password authentication (1) Industry 93,71 Comunitat Valenciana K.1.A % of enterprises that apply strong password authentication (1) Construction 92,54 Comunitat Valenciana K.1.A % of enterprises that apply strong password authentication (1) Services 96,8 Comunitat Valenciana K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total Enterprises 52,73 Comunitat Valenciana K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Industry 52,42 Comunitat Valenciana K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Construction 41,92 Comunitat Valenciana K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Services 55,03 Comunitat Valenciana K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total Enterprises 13,15 Comunitat Valenciana K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Industry 16,26 Comunitat Valenciana K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Construction 4,09 Comunitat Valenciana K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Services 13,03 Comunitat Valenciana K.1.D % of enterprises that use external data backup (1) Total Enterprises 58,32 Comunitat Valenciana K.1.D % of enterprises that use external data backup (1) Industry 59,67 Comunitat Valenciana K.1.D % of enterprises that use external data backup (1) Construction 41,55 Comunitat Valenciana K.1.D % of enterprises that use external data backup (1) Services 60,76 Comunitat Valenciana K.1.E % of enterprises that use protocols to analyze security incidents (1) Total Enterprises 33,22 Comunitat Valenciana K.1.E % of enterprises that use protocols to analyze security incidents (1) Industry 31,38 Comunitat Valenciana K.1.E % of enterprises that use protocols to analyze security incidents (1) Construction 22,47 Comunitat Valenciana K.1.E % of enterprises that use protocols to analyze security incidents (1) Services 36,43 Extremadura K.1 % of enterprises that use internal security systems Total Enterprises 78,92 Extremadura K.1 % of enterprises that use internal security systems Industry 74,41 Extremadura K.1 % of enterprises that use internal security systems Construction 59,09 Extremadura K.1 % of enterprises that use internal security systems Services 87,04 Extremadura K.1.A % of enterprises that apply strong password authentication (1) Total Enterprises 94,43 Extremadura K.1.A % of enterprises that apply strong password authentication (1) Industry 97,13 Extremadura K.1.A % of enterprises that apply strong password authentication (1) Construction 93,08 Extremadura K.1.A % of enterprises that apply strong password authentication (1) Services 93,54 Extremadura K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total Enterprises 57,65 Extremadura K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Industry 54,11 Extremadura K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Construction 78,59 Extremadura K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Services 54,96 Extremadura K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total Enterprises 9,59 Extremadura K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Industry 18 Extremadura K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Construction 8,18 Extremadura K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Services 6,27 Extremadura K.1.D % of enterprises that use external data backup (1) Total Enterprises 49,44 Extremadura K.1.D % of enterprises that use external data backup (1) Industry 47,22 Extremadura K.1.D % of enterprises that use external data backup (1) Construction 37,81 Extremadura K.1.D % of enterprises that use external data backup (1) Services 52,73 Extremadura K.1.E % of enterprises that use protocols to analyze security incidents (1) Total Enterprises 24,84 Extremadura K.1.E % of enterprises that use protocols to analyze security incidents (1) Industry 22,59 Extremadura K.1.E % of enterprises that use protocols to analyze security incidents (1) Construction 49,27 Extremadura K.1.E % of enterprises that use protocols to analyze security incidents (1) Services 20,9 Galicia K.1 % of enterprises that use internal security systems Total Enterprises 81,85 Galicia K.1 % of enterprises that use internal security systems Industry 79,97 Galicia K.1 % of enterprises that use internal security systems Construction 69,11 Galicia K.1 % of enterprises that use internal security systems Services 86,37 Galicia K.1.A % of enterprises that apply strong password authentication (1) Total Enterprises 95,47 Galicia K.1.A % of enterprises that apply strong password authentication (1) Industry 92,79 Galicia K.1.A % of enterprises that apply strong password authentication (1) Construction 100 Galicia K.1.A % of enterprises that apply strong password authentication (1) Services 95,9 Galicia K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total Enterprises 48,74 Galicia K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Industry 43,59 Galicia K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Construction 50,74 Galicia K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Services 51,03 Galicia K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total Enterprises 12,97 Galicia K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Industry 12,17 Galicia K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Construction 3,82 Galicia K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Services 15,37 Galicia K.1.D % of enterprises that use external data backup (1) Total Enterprises 57,87 Galicia K.1.D % of enterprises that use external data backup (1) Industry 62,63 Galicia K.1.D % of enterprises that use external data backup (1) Construction 42,87 Galicia K.1.D % of enterprises that use external data backup (1) Services 58,6 Galicia K.1.E % of enterprises that use protocols to analyze security incidents (1) Total Enterprises 37,31 Galicia K.1.E % of enterprises that use protocols to analyze security incidents (1) Industry 34,94 Galicia K.1.E % of enterprises that use protocols to analyze security incidents (1) Construction 40,32 Galicia K.1.E % of enterprises that use protocols to analyze security incidents (1) Services 37,92 Madrid, Comunidad de K.1 % of enterprises that use internal security systems Total Enterprises 89,89 Madrid, Comunidad de K.1 % of enterprises that use internal security systems Industry 86,45 Madrid, Comunidad de K.1 % of enterprises that use internal security systems Construction 82,15 Madrid, Comunidad de K.1 % of enterprises that use internal security systems Services 92,2 Madrid, Comunidad de K.1.A % of enterprises that apply strong password authentication (1) Total Enterprises 91,54 Madrid, Comunidad de K.1.A % of enterprises that apply strong password authentication (1) Industry 89,53 Madrid, Comunidad de K.1.A % of enterprises that apply strong password authentication (1) Construction 91,34 Madrid, Comunidad de K.1.A % of enterprises that apply strong password authentication (1) Services 91,98 Madrid, Comunidad de K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total Enterprises 55,97 Madrid, Comunidad de K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Industry 56,43 Madrid, Comunidad de K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Construction 62,12 Madrid, Comunidad de K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Services 54,77 Madrid, Comunidad de K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total Enterprises 17,62 Madrid, Comunidad de K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Industry 14,03 Madrid, Comunidad de K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Construction 10,64 Madrid, Comunidad de K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Services 19,59 Madrid, Comunidad de K.1.D % of enterprises that use external data backup (1) Total Enterprises 69,78 Madrid, Comunidad de K.1.D % of enterprises that use external data backup (1) Industry 64,37 Madrid, Comunidad de K.1.D % of enterprises that use external data backup (1) Construction 66,89 Madrid, Comunidad de K.1.D % of enterprises that use external data backup (1) Services 71,39 Madrid, Comunidad de K.1.E % of enterprises that use protocols to analyze security incidents (1) Total Enterprises 47,67 Madrid, Comunidad de K.1.E % of enterprises that use protocols to analyze security incidents (1) Industry 40,55 Madrid, Comunidad de K.1.E % of enterprises that use protocols to analyze security incidents (1) Construction 44,27 Madrid, Comunidad de K.1.E % of enterprises that use protocols to analyze security incidents (1) Services 49,71 Murcia, Región de K.1 % of enterprises that use internal security systems Total Enterprises 83,33 Murcia, Región de K.1 % of enterprises that use internal security systems Industry 88,28 Murcia, Región de K.1 % of enterprises that use internal security systems Construction 76,3 Murcia, Región de K.1 % of enterprises that use internal security systems Services 82,28 Murcia, Región de K.1.A % of enterprises that apply strong password authentication (1) Total Enterprises 93,39 Murcia, Región de K.1.A % of enterprises that apply strong password authentication (1) Industry 90,04 Murcia, Región de K.1.A % of enterprises that apply strong password authentication (1) Construction 88,52 Murcia, Región de K.1.A % of enterprises that apply strong password authentication (1) Services 96,22 Murcia, Región de K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total Enterprises 52,33 Murcia, Región de K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Industry 55,79 Murcia, Región de K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Construction 46,1 Murcia, Región de K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Services 51,64 Murcia, Región de K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total Enterprises 15,97 Murcia, Región de K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Industry 20,58 Murcia, Región de K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Construction 8,81 Murcia, Región de K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Services 14,85 Murcia, Región de K.1.D % of enterprises that use external data backup (1) Total Enterprises 50,44 Murcia, Región de K.1.D % of enterprises that use external data backup (1) Industry 50,35 Murcia, Región de K.1.D % of enterprises that use external data backup (1) Construction 56,23 Murcia, Región de K.1.D % of enterprises that use external data backup (1) Services 49,32 Murcia, Región de K.1.E % of enterprises that use protocols to analyze security incidents (1) Total Enterprises 34,05 Murcia, Región de K.1.E % of enterprises that use protocols to analyze security incidents (1) Industry 33,75 Murcia, Región de K.1.E % of enterprises that use protocols to analyze security incidents (1) Construction 20,48 Murcia, Región de K.1.E % of enterprises that use protocols to analyze security incidents (1) Services 36,94 Navarra, Comunidad Foral de K.1 % of enterprises that use internal security systems Total Enterprises 90,13 Navarra, Comunidad Foral de K.1 % of enterprises that use internal security systems Industry 97,1 Navarra, Comunidad Foral de K.1 % of enterprises that use internal security systems Construction 61,6 Navarra, Comunidad Foral de K.1 % of enterprises that use internal security systems Services 90,25 Navarra, Comunidad Foral de K.1.A % of enterprises that apply strong password authentication (1) Total Enterprises 90,48 Navarra, Comunidad Foral de K.1.A % of enterprises that apply strong password authentication (1) Industry 96,49 Navarra, Comunidad Foral de K.1.A % of enterprises that apply strong password authentication (1) Construction 81,31 Navarra, Comunidad Foral de K.1.A % of enterprises that apply strong password authentication (1) Services 85,68 Navarra, Comunidad Foral de K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total Enterprises 53,08 Navarra, Comunidad Foral de K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Industry 52,65 Navarra, Comunidad Foral de K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Construction 51,81 Navarra, Comunidad Foral de K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Services 53,75 Navarra, Comunidad Foral de K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total Enterprises 9,7 Navarra, Comunidad Foral de K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Industry 9,34 Navarra, Comunidad Foral de K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Construction 2,88 Navarra, Comunidad Foral de K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Services 11,21 Navarra, Comunidad Foral de K.1.D % of enterprises that use external data backup (1) Total Enterprises 63,12 Navarra, Comunidad Foral de K.1.D % of enterprises that use external data backup (1) Industry 66,8 Navarra, Comunidad Foral de K.1.D % of enterprises that use external data backup (1) Construction 82,13 Navarra, Comunidad Foral de K.1.D % of enterprises that use external data backup (1) Services 56,09 Navarra, Comunidad Foral de K.1.E % of enterprises that use protocols to analyze security incidents (1) Total Enterprises 44,57 Navarra, Comunidad Foral de K.1.E % of enterprises that use protocols to analyze security incidents (1) Industry 44,88 Navarra, Comunidad Foral de K.1.E % of enterprises that use protocols to analyze security incidents (1) Construction 11,29 Navarra, Comunidad Foral de K.1.E % of enterprises that use protocols to analyze security incidents (1) Services 49,77 País Vasco K.1 % of enterprises that use internal security systems Total Enterprises 89,37 País Vasco K.1 % of enterprises that use internal security systems Industry 91,81 País Vasco K.1 % of enterprises that use internal security systems Construction 93,48 País Vasco K.1 % of enterprises that use internal security systems Services 86,38 País Vasco K.1.A % of enterprises that apply strong password authentication (1) Total Enterprises 90,33 País Vasco K.1.A % of enterprises that apply strong password authentication (1) Industry 83,99 País Vasco K.1.A % of enterprises that apply strong password authentication (1) Construction 100 País Vasco K.1.A % of enterprises that apply strong password authentication (1) Services 93,72 País Vasco K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total Enterprises 50,97 País Vasco K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Industry 54,23 País Vasco K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Construction 38,01 País Vasco K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Services 51,14 País Vasco K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total Enterprises 12,82 País Vasco K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Industry 16,1 País Vasco K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Construction 6,08 País Vasco K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Services 11,48 País Vasco K.1.D % of enterprises that use external data backup (1) Total Enterprises 63,91 País Vasco K.1.D % of enterprises that use external data backup (1) Industry 64,98 País Vasco K.1.D % of enterprises that use external data backup (1) Construction 58,41 País Vasco K.1.D % of enterprises that use external data backup (1) Services 64,26 País Vasco K.1.E % of enterprises that use protocols to analyze security incidents (1) Total Enterprises 37,73 País Vasco K.1.E % of enterprises that use protocols to analyze security incidents (1) Industry 39,18 País Vasco K.1.E % of enterprises that use protocols to analyze security incidents (1) Construction 25,22 País Vasco K.1.E % of enterprises that use protocols to analyze security incidents (1) Services 39,44 Rioja, La K.1 % of enterprises that use internal security systems Total Enterprises 88,9 Rioja, La K.1 % of enterprises that use internal security systems Industry 89,14 Rioja, La K.1 % of enterprises that use internal security systems Construction 93,43 Rioja, La K.1 % of enterprises that use internal security systems Services 87,4 Rioja, La K.1.A % of enterprises that apply strong password authentication (1) Total Enterprises 94,68 Rioja, La K.1.A % of enterprises that apply strong password authentication (1) Industry 99,13 Rioja, La K.1.A % of enterprises that apply strong password authentication (1) Construction 100 Rioja, La K.1.A % of enterprises that apply strong password authentication (1) Services 87,16 Rioja, La K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total Enterprises 49,47 Rioja, La K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Industry 42,56 Rioja, La K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Construction 52,78 Rioja, La K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Services 57,87 Rioja, La K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total Enterprises 10,73 Rioja, La K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Industry 13,47 Rioja, La K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Construction 4,15 Rioja, La K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Services 8,9 Rioja, La K.1.D % of enterprises that use external data backup (1) Total Enterprises 65,56 Rioja, La K.1.D % of enterprises that use external data backup (1) Industry 65,66 Rioja, La K.1.D % of enterprises that use external data backup (1) Construction 69,95 Rioja, La K.1.D % of enterprises that use external data backup (1) Services 64,19 Rioja, La K.1.E % of enterprises that use protocols to analyze security incidents (1) Total Enterprises 30,92 Rioja, La K.1.E % of enterprises that use protocols to analyze security incidents (1) Industry 29,5 Rioja, La K.1.E % of enterprises that use protocols to analyze security incidents (1) Construction 29,38 Rioja, La K.1.E % of enterprises that use protocols to analyze security incidents (1) Services 33,26 Ceuta K.1 % of enterprises that use internal security systems Total Enterprises 77,34 Ceuta K.1 % of enterprises that use internal security systems Industry 89,29 Ceuta K.1 % of enterprises that use internal security systems Construction 38,13 Ceuta K.1 % of enterprises that use internal security systems Services 84,27 Ceuta K.1.A % of enterprises that apply strong password authentication (1) Total Enterprises 88,83 Ceuta K.1.A % of enterprises that apply strong password authentication (1) Industry 100 Ceuta K.1.A % of enterprises that apply strong password authentication (1) Construction 26,23 Ceuta K.1.A % of enterprises that apply strong password authentication (1) Services 93,33 Ceuta K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total Enterprises 29,04 Ceuta K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Industry 76 Ceuta K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Construction 73,77 Ceuta K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Services 16,67 Ceuta K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total Enterprises 11,04 Ceuta K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Industry 8 Ceuta K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Construction 0 Ceuta K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Services 12,67 Ceuta K.1.D % of enterprises that use external data backup (1) Total Enterprises 63,07 Ceuta K.1.D % of enterprises that use external data backup (1) Industry 76 Ceuta K.1.D % of enterprises that use external data backup (1) Construction 0 Ceuta K.1.D % of enterprises that use external data backup (1) Services 67,33 Ceuta K.1.E % of enterprises that use protocols to analyze security incidents (1) Total Enterprises 24,7 Ceuta K.1.E % of enterprises that use protocols to analyze security incidents (1) Industry 8 Ceuta K.1.E % of enterprises that use protocols to analyze security incidents (1) Construction 0 Ceuta K.1.E % of enterprises that use protocols to analyze security incidents (1) Services 30 Melilla K.1 % of enterprises that use internal security systems Total Enterprises 83,61 Melilla K.1 % of enterprises that use internal security systems Industry 77,78 Melilla K.1 % of enterprises that use internal security systems Construction 100 Melilla K.1 % of enterprises that use internal security systems Services 79,89 Melilla K.1.A % of enterprises that apply strong password authentication (1) Total Enterprises 98,49 Melilla K.1.A % of enterprises that apply strong password authentication (1) Industry 100 Melilla K.1.A % of enterprises that apply strong password authentication (1) Construction 100 Melilla K.1.A % of enterprises that apply strong password authentication (1) Services 97,84 Melilla K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Total Enterprises 32,16 Melilla K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Industry 42,86 Melilla K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Construction 43,48 Melilla K.1.B % of enterprises that use user identification and authentication with hardware elements (1) Services 27,34 Melilla K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Total Enterprises 20,1 Melilla K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Industry 0 Melilla K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Construction 0 Melilla K.1.C % of enterprises that use user identification and authentication with biometric elements (1) Services 28,78 Melilla K.1.D % of enterprises that use external data backup (1) Total Enterprises 32,41 Melilla K.1.D % of enterprises that use external data backup (1) Industry 42,86 Melilla K.1.D % of enterprises that use external data backup (1) Construction 57,61 Melilla K.1.D % of enterprises that use external data backup (1) Services 23,02 Melilla K.1.E % of enterprises that use protocols to analyze security incidents (1) Total Enterprises 38,57 Melilla K.1.E % of enterprises that use protocols to analyze security incidents (1) Industry 71,43 Melilla K.1.E % of enterprises that use protocols to analyze security incidents (1) Construction 21,2 Melilla K.1.E % of enterprises that use protocols to analyze security incidents (1) Services 41,01