Autonomous communities and cities;Main variables;Economic activity cluster;Total National total;K.1 % of enterprises that use internal security systems;Total Enterprises;87,31 National total;K.1 % of enterprises that use internal security systems;Industry;86,79 National total;K.1 % of enterprises that use internal security systems;Construction;81,28 National total;K.1 % of enterprises that use internal security systems;Services;88,88 National total;K.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;92,74 National total;K.1.A % of enterprises that apply strong password authentication (1);Industry;91,21 National total;K.1.A % of enterprises that apply strong password authentication (1);Construction;93,45 National total;K.1.A % of enterprises that apply strong password authentication (1);Services;93,27 National total;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;52,29 National total;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;52,4 National total;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;50,8 National total;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;52,55 National total;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;13,59 National total;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;14,39 National total;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;7,06 National total;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;14,58 National total;K.1.D % of enterprises that use external data backup (1);Total Enterprises;61,87 National total;K.1.D % of enterprises that use external data backup (1);Industry;60,59 National total;K.1.D % of enterprises that use external data backup (1);Construction;52,74 National total;K.1.D % of enterprises that use external data backup (1);Services;64,3 National total;K.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;38,9 National total;K.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;36 National total;K.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;31,03 National total;K.1.E % of enterprises that use protocols to analyze security incidents (1);Services;41,78 Andalucía;K.1 % of enterprises that use internal security systems;Total Enterprises;87,7 Andalucía;K.1 % of enterprises that use internal security systems;Industry;86,8 Andalucía;K.1 % of enterprises that use internal security systems;Construction;84,62 Andalucía;K.1 % of enterprises that use internal security systems;Services;88,84 Andalucía;K.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;92,85 Andalucía;K.1.A % of enterprises that apply strong password authentication (1);Industry;87,83 Andalucía;K.1.A % of enterprises that apply strong password authentication (1);Construction;96,73 Andalucía;K.1.A % of enterprises that apply strong password authentication (1);Services;93,55 Andalucía;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;50,61 Andalucía;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;49,38 Andalucía;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;49,08 Andalucía;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;51,41 Andalucía;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;10,65 Andalucía;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;11,71 Andalucía;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;1,55 Andalucía;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;12,61 Andalucía;K.1.D % of enterprises that use external data backup (1);Total Enterprises;46,57 Andalucía;K.1.D % of enterprises that use external data backup (1);Industry;45,06 Andalucía;K.1.D % of enterprises that use external data backup (1);Construction;29,73 Andalucía;K.1.D % of enterprises that use external data backup (1);Services;51,36 Andalucía;K.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;30,03 Andalucía;K.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;27,5 Andalucía;K.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;15,74 Andalucía;K.1.E % of enterprises that use protocols to analyze security incidents (1);Services;34,52 Aragón;K.1 % of enterprises that use internal security systems;Total Enterprises;85,27 Aragón;K.1 % of enterprises that use internal security systems;Industry;85,14 Aragón;K.1 % of enterprises that use internal security systems;Construction;75,15 Aragón;K.1 % of enterprises that use internal security systems;Services;87,87 Aragón;K.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;93,39 Aragón;K.1.A % of enterprises that apply strong password authentication (1);Industry;92,52 Aragón;K.1.A % of enterprises that apply strong password authentication (1);Construction;98,84 Aragón;K.1.A % of enterprises that apply strong password authentication (1);Services;92,83 Aragón;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;47,17 Aragón;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;47,44 Aragón;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;50,66 Aragón;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;46,23 Aragón;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;14,08 Aragón;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;20,55 Aragón;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;5,91 Aragón;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;11,33 Aragón;K.1.D % of enterprises that use external data backup (1);Total Enterprises;67,1 Aragón;K.1.D % of enterprises that use external data backup (1);Industry;71,16 Aragón;K.1.D % of enterprises that use external data backup (1);Construction;76,18 Aragón;K.1.D % of enterprises that use external data backup (1);Services;62,36 Aragón;K.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;38,34 Aragón;K.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;37,1 Aragón;K.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;37,46 Aragón;K.1.E % of enterprises that use protocols to analyze security incidents (1);Services;39,38 Asturias, Principado de;K.1 % of enterprises that use internal security systems;Total Enterprises;89,31 Asturias, Principado de;K.1 % of enterprises that use internal security systems;Industry;88,25 Asturias, Principado de;K.1 % of enterprises that use internal security systems;Construction;86,47 Asturias, Principado de;K.1 % of enterprises that use internal security systems;Services;90,51 Asturias, Principado de;K.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;92,62 Asturias, Principado de;K.1.A % of enterprises that apply strong password authentication (1);Industry;91,09 Asturias, Principado de;K.1.A % of enterprises that apply strong password authentication (1);Construction;92,99 Asturias, Principado de;K.1.A % of enterprises that apply strong password authentication (1);Services;93,31 Asturias, Principado de;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;44,69 Asturias, Principado de;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;44,5 Asturias, Principado de;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;36,86 Asturias, Principado de;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;46,51 Asturias, Principado de;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;8,76 Asturias, Principado de;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;8,95 Asturias, Principado de;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;8,84 Asturias, Principado de;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;8,65 Asturias, Principado de;K.1.D % of enterprises that use external data backup (1);Total Enterprises;62,74 Asturias, Principado de;K.1.D % of enterprises that use external data backup (1);Industry;57,2 Asturias, Principado de;K.1.D % of enterprises that use external data backup (1);Construction;62,64 Asturias, Principado de;K.1.D % of enterprises that use external data backup (1);Services;65,54 Asturias, Principado de;K.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;31,7 Asturias, Principado de;K.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;29,3 Asturias, Principado de;K.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;28,8 Asturias, Principado de;K.1.E % of enterprises that use protocols to analyze security incidents (1);Services;33,54 Balears, Illes;K.1 % of enterprises that use internal security systems;Total Enterprises;89,54 Balears, Illes;K.1 % of enterprises that use internal security systems;Industry;80,99 Balears, Illes;K.1 % of enterprises that use internal security systems;Construction;89,22 Balears, Illes;K.1 % of enterprises that use internal security systems;Services;91,42 Balears, Illes;K.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;91,18 Balears, Illes;K.1.A % of enterprises that apply strong password authentication (1);Industry;91,61 Balears, Illes;K.1.A % of enterprises that apply strong password authentication (1);Construction;84,11 Balears, Illes;K.1.A % of enterprises that apply strong password authentication (1);Services;93,56 Balears, Illes;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;47,72 Balears, Illes;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;47,55 Balears, Illes;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;45,15 Balears, Illes;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;48,64 Balears, Illes;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;14,19 Balears, Illes;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;9,46 Balears, Illes;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;10,73 Balears, Illes;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;16,25 Balears, Illes;K.1.D % of enterprises that use external data backup (1);Total Enterprises;60,29 Balears, Illes;K.1.D % of enterprises that use external data backup (1);Industry;56,35 Balears, Illes;K.1.D % of enterprises that use external data backup (1);Construction;57,34 Balears, Illes;K.1.D % of enterprises that use external data backup (1);Services;62,03 Balears, Illes;K.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;36,71 Balears, Illes;K.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;34,04 Balears, Illes;K.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;32,26 Balears, Illes;K.1.E % of enterprises that use protocols to analyze security incidents (1);Services;38,75 Canarias;K.1 % of enterprises that use internal security systems;Total Enterprises;86,62 Canarias;K.1 % of enterprises that use internal security systems;Industry;87,73 Canarias;K.1 % of enterprises that use internal security systems;Construction;80,04 Canarias;K.1 % of enterprises that use internal security systems;Services;87,83 Canarias;K.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;92,8 Canarias;K.1.A % of enterprises that apply strong password authentication (1);Industry;94,19 Canarias;K.1.A % of enterprises that apply strong password authentication (1);Construction;92,14 Canarias;K.1.A % of enterprises that apply strong password authentication (1);Services;92,69 Canarias;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;53,21 Canarias;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;60,34 Canarias;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;57,87 Canarias;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;51,09 Canarias;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;12,99 Canarias;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;11,99 Canarias;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;12,05 Canarias;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;13,34 Canarias;K.1.D % of enterprises that use external data backup (1);Total Enterprises;60,96 Canarias;K.1.D % of enterprises that use external data backup (1);Industry;75,58 Canarias;K.1.D % of enterprises that use external data backup (1);Construction;50,61 Canarias;K.1.D % of enterprises that use external data backup (1);Services;60,48 Canarias;K.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;43,74 Canarias;K.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;32,32 Canarias;K.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;48,19 Canarias;K.1.E % of enterprises that use protocols to analyze security incidents (1);Services;44,83 Cantabria;K.1 % of enterprises that use internal security systems;Total Enterprises;81,09 Cantabria;K.1 % of enterprises that use internal security systems;Industry;69,32 Cantabria;K.1 % of enterprises that use internal security systems;Construction;91,91 Cantabria;K.1 % of enterprises that use internal security systems;Services;85,22 Cantabria;K.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;93,55 Cantabria;K.1.A % of enterprises that apply strong password authentication (1);Industry;95,45 Cantabria;K.1.A % of enterprises that apply strong password authentication (1);Construction;100 Cantabria;K.1.A % of enterprises that apply strong password authentication (1);Services;90,82 Cantabria;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;46,85 Cantabria;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;53,96 Cantabria;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;35,11 Cantabria;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;46,73 Cantabria;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;10,83 Cantabria;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;9,43 Cantabria;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;15,41 Cantabria;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;10,22 Cantabria;K.1.D % of enterprises that use external data backup (1);Total Enterprises;56,72 Cantabria;K.1.D % of enterprises that use external data backup (1);Industry;45,6 Cantabria;K.1.D % of enterprises that use external data backup (1);Construction;61,28 Cantabria;K.1.D % of enterprises that use external data backup (1);Services;60,8 Cantabria;K.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;33,99 Cantabria;K.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;31,13 Cantabria;K.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;23,98 Cantabria;K.1.E % of enterprises that use protocols to analyze security incidents (1);Services;38,19 Castilla y León;K.1 % of enterprises that use internal security systems;Total Enterprises;84,02 Castilla y León;K.1 % of enterprises that use internal security systems;Industry;83,43 Castilla y León;K.1 % of enterprises that use internal security systems;Construction;71,54 Castilla y León;K.1 % of enterprises that use internal security systems;Services;87,67 Castilla y León;K.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;95,31 Castilla y León;K.1.A % of enterprises that apply strong password authentication (1);Industry;95,99 Castilla y León;K.1.A % of enterprises that apply strong password authentication (1);Construction;100 Castilla y León;K.1.A % of enterprises that apply strong password authentication (1);Services;93,92 Castilla y León;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;49,75 Castilla y León;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;54,83 Castilla y León;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;24,61 Castilla y León;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;52,28 Castilla y León;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;9,71 Castilla y León;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;8,44 Castilla y León;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;3,72 Castilla y León;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;11,71 Castilla y León;K.1.D % of enterprises that use external data backup (1);Total Enterprises;52,84 Castilla y León;K.1.D % of enterprises that use external data backup (1);Industry;54,88 Castilla y León;K.1.D % of enterprises that use external data backup (1);Construction;36,53 Castilla y León;K.1.D % of enterprises that use external data backup (1);Services;55,19 Castilla y León;K.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;33,44 Castilla y León;K.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;34,12 Castilla y León;K.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;13 Castilla y León;K.1.E % of enterprises that use protocols to analyze security incidents (1);Services;37,46 Castilla-La Mancha;K.1 % of enterprises that use internal security systems;Total Enterprises;80,73 Castilla-La Mancha;K.1 % of enterprises that use internal security systems;Industry;81,02 Castilla-La Mancha;K.1 % of enterprises that use internal security systems;Construction;70,15 Castilla-La Mancha;K.1 % of enterprises that use internal security systems;Services;84,32 Castilla-La Mancha;K.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;90,96 Castilla-La Mancha;K.1.A % of enterprises that apply strong password authentication (1);Industry;87,43 Castilla-La Mancha;K.1.A % of enterprises that apply strong password authentication (1);Construction;97,18 Castilla-La Mancha;K.1.A % of enterprises that apply strong password authentication (1);Services;91,93 Castilla-La Mancha;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;52,25 Castilla-La Mancha;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;56,1 Castilla-La Mancha;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;56,62 Castilla-La Mancha;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;47,83 Castilla-La Mancha;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;11,62 Castilla-La Mancha;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;11,93 Castilla-La Mancha;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;8,58 Castilla-La Mancha;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;12,29 Castilla-La Mancha;K.1.D % of enterprises that use external data backup (1);Total Enterprises;57,03 Castilla-La Mancha;K.1.D % of enterprises that use external data backup (1);Industry;52,8 Castilla-La Mancha;K.1.D % of enterprises that use external data backup (1);Construction;55,08 Castilla-La Mancha;K.1.D % of enterprises that use external data backup (1);Services;61,02 Castilla-La Mancha;K.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;32,29 Castilla-La Mancha;K.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;24,75 Castilla-La Mancha;K.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;31,41 Castilla-La Mancha;K.1.E % of enterprises that use protocols to analyze security incidents (1);Services;38,64 Cataluña;K.1 % of enterprises that use internal security systems;Total Enterprises;89,77 Cataluña;K.1 % of enterprises that use internal security systems;Industry;92,91 Cataluña;K.1 % of enterprises that use internal security systems;Construction;85,13 Cataluña;K.1 % of enterprises that use internal security systems;Services;89,14 Cataluña;K.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;92,23 Cataluña;K.1.A % of enterprises that apply strong password authentication (1);Industry;92,25 Cataluña;K.1.A % of enterprises that apply strong password authentication (1);Construction;90,19 Cataluña;K.1.A % of enterprises that apply strong password authentication (1);Services;92,54 Cataluña;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;53,64 Cataluña;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;53,25 Cataluña;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;54,77 Cataluña;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;53,65 Cataluña;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;14,4 Cataluña;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;15,84 Cataluña;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;8,67 Cataluña;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;14,64 Cataluña;K.1.D % of enterprises that use external data backup (1);Total Enterprises;71,17 Cataluña;K.1.D % of enterprises that use external data backup (1);Industry;66,13 Cataluña;K.1.D % of enterprises that use external data backup (1);Construction;61,86 Cataluña;K.1.D % of enterprises that use external data backup (1);Services;74,97 Cataluña;K.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;44,23 Cataluña;K.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;43,68 Cataluña;K.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;35,65 Cataluña;K.1.E % of enterprises that use protocols to analyze security incidents (1);Services;45,85 Comunitat Valenciana;K.1 % of enterprises that use internal security systems;Total Enterprises;85,3 Comunitat Valenciana;K.1 % of enterprises that use internal security systems;Industry;81,83 Comunitat Valenciana;K.1 % of enterprises that use internal security systems;Construction;82,46 Comunitat Valenciana;K.1 % of enterprises that use internal security systems;Services;88,16 Comunitat Valenciana;K.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;95,3 Comunitat Valenciana;K.1.A % of enterprises that apply strong password authentication (1);Industry;93,71 Comunitat Valenciana;K.1.A % of enterprises that apply strong password authentication (1);Construction;92,54 Comunitat Valenciana;K.1.A % of enterprises that apply strong password authentication (1);Services;96,8 Comunitat Valenciana;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;52,73 Comunitat Valenciana;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;52,42 Comunitat Valenciana;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;41,92 Comunitat Valenciana;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;55,03 Comunitat Valenciana;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;13,15 Comunitat Valenciana;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;16,26 Comunitat Valenciana;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;4,09 Comunitat Valenciana;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;13,03 Comunitat Valenciana;K.1.D % of enterprises that use external data backup (1);Total Enterprises;58,32 Comunitat Valenciana;K.1.D % of enterprises that use external data backup (1);Industry;59,67 Comunitat Valenciana;K.1.D % of enterprises that use external data backup (1);Construction;41,55 Comunitat Valenciana;K.1.D % of enterprises that use external data backup (1);Services;60,76 Comunitat Valenciana;K.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;33,22 Comunitat Valenciana;K.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;31,38 Comunitat Valenciana;K.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;22,47 Comunitat Valenciana;K.1.E % of enterprises that use protocols to analyze security incidents (1);Services;36,43 Extremadura;K.1 % of enterprises that use internal security systems;Total Enterprises;78,92 Extremadura;K.1 % of enterprises that use internal security systems;Industry;74,41 Extremadura;K.1 % of enterprises that use internal security systems;Construction;59,09 Extremadura;K.1 % of enterprises that use internal security systems;Services;87,04 Extremadura;K.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;94,43 Extremadura;K.1.A % of enterprises that apply strong password authentication (1);Industry;97,13 Extremadura;K.1.A % of enterprises that apply strong password authentication (1);Construction;93,08 Extremadura;K.1.A % of enterprises that apply strong password authentication (1);Services;93,54 Extremadura;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;57,65 Extremadura;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;54,11 Extremadura;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;78,59 Extremadura;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;54,96 Extremadura;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;9,59 Extremadura;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;18 Extremadura;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;8,18 Extremadura;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;6,27 Extremadura;K.1.D % of enterprises that use external data backup (1);Total Enterprises;49,44 Extremadura;K.1.D % of enterprises that use external data backup (1);Industry;47,22 Extremadura;K.1.D % of enterprises that use external data backup (1);Construction;37,81 Extremadura;K.1.D % of enterprises that use external data backup (1);Services;52,73 Extremadura;K.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;24,84 Extremadura;K.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;22,59 Extremadura;K.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;49,27 Extremadura;K.1.E % of enterprises that use protocols to analyze security incidents (1);Services;20,9 Galicia;K.1 % of enterprises that use internal security systems;Total Enterprises;81,85 Galicia;K.1 % of enterprises that use internal security systems;Industry;79,97 Galicia;K.1 % of enterprises that use internal security systems;Construction;69,11 Galicia;K.1 % of enterprises that use internal security systems;Services;86,37 Galicia;K.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;95,47 Galicia;K.1.A % of enterprises that apply strong password authentication (1);Industry;92,79 Galicia;K.1.A % of enterprises that apply strong password authentication (1);Construction;100 Galicia;K.1.A % of enterprises that apply strong password authentication (1);Services;95,9 Galicia;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;48,74 Galicia;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;43,59 Galicia;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;50,74 Galicia;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;51,03 Galicia;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;12,97 Galicia;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;12,17 Galicia;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;3,82 Galicia;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;15,37 Galicia;K.1.D % of enterprises that use external data backup (1);Total Enterprises;57,87 Galicia;K.1.D % of enterprises that use external data backup (1);Industry;62,63 Galicia;K.1.D % of enterprises that use external data backup (1);Construction;42,87 Galicia;K.1.D % of enterprises that use external data backup (1);Services;58,6 Galicia;K.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;37,31 Galicia;K.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;34,94 Galicia;K.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;40,32 Galicia;K.1.E % of enterprises that use protocols to analyze security incidents (1);Services;37,92 Madrid, Comunidad de;K.1 % of enterprises that use internal security systems;Total Enterprises;89,89 Madrid, Comunidad de;K.1 % of enterprises that use internal security systems;Industry;86,45 Madrid, Comunidad de;K.1 % of enterprises that use internal security systems;Construction;82,15 Madrid, Comunidad de;K.1 % of enterprises that use internal security systems;Services;92,2 Madrid, Comunidad de;K.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;91,54 Madrid, Comunidad de;K.1.A % of enterprises that apply strong password authentication (1);Industry;89,53 Madrid, Comunidad de;K.1.A % of enterprises that apply strong password authentication (1);Construction;91,34 Madrid, Comunidad de;K.1.A % of enterprises that apply strong password authentication (1);Services;91,98 Madrid, Comunidad de;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;55,97 Madrid, Comunidad de;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;56,43 Madrid, Comunidad de;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;62,12 Madrid, Comunidad de;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;54,77 Madrid, Comunidad de;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;17,62 Madrid, Comunidad de;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;14,03 Madrid, Comunidad de;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;10,64 Madrid, Comunidad de;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;19,59 Madrid, Comunidad de;K.1.D % of enterprises that use external data backup (1);Total Enterprises;69,78 Madrid, Comunidad de;K.1.D % of enterprises that use external data backup (1);Industry;64,37 Madrid, Comunidad de;K.1.D % of enterprises that use external data backup (1);Construction;66,89 Madrid, Comunidad de;K.1.D % of enterprises that use external data backup (1);Services;71,39 Madrid, Comunidad de;K.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;47,67 Madrid, Comunidad de;K.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;40,55 Madrid, Comunidad de;K.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;44,27 Madrid, Comunidad de;K.1.E % of enterprises that use protocols to analyze security incidents (1);Services;49,71 Murcia, Región de;K.1 % of enterprises that use internal security systems;Total Enterprises;83,33 Murcia, Región de;K.1 % of enterprises that use internal security systems;Industry;88,28 Murcia, Región de;K.1 % of enterprises that use internal security systems;Construction;76,3 Murcia, Región de;K.1 % of enterprises that use internal security systems;Services;82,28 Murcia, Región de;K.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;93,39 Murcia, Región de;K.1.A % of enterprises that apply strong password authentication (1);Industry;90,04 Murcia, Región de;K.1.A % of enterprises that apply strong password authentication (1);Construction;88,52 Murcia, Región de;K.1.A % of enterprises that apply strong password authentication (1);Services;96,22 Murcia, Región de;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;52,33 Murcia, Región de;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;55,79 Murcia, Región de;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;46,1 Murcia, Región de;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;51,64 Murcia, Región de;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;15,97 Murcia, Región de;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;20,58 Murcia, Región de;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;8,81 Murcia, Región de;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;14,85 Murcia, Región de;K.1.D % of enterprises that use external data backup (1);Total Enterprises;50,44 Murcia, Región de;K.1.D % of enterprises that use external data backup (1);Industry;50,35 Murcia, Región de;K.1.D % of enterprises that use external data backup (1);Construction;56,23 Murcia, Región de;K.1.D % of enterprises that use external data backup (1);Services;49,32 Murcia, Región de;K.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;34,05 Murcia, Región de;K.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;33,75 Murcia, Región de;K.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;20,48 Murcia, Región de;K.1.E % of enterprises that use protocols to analyze security incidents (1);Services;36,94 Navarra, Comunidad Foral de;K.1 % of enterprises that use internal security systems;Total Enterprises;90,13 Navarra, Comunidad Foral de;K.1 % of enterprises that use internal security systems;Industry;97,1 Navarra, Comunidad Foral de;K.1 % of enterprises that use internal security systems;Construction;61,6 Navarra, Comunidad Foral de;K.1 % of enterprises that use internal security systems;Services;90,25 Navarra, Comunidad Foral de;K.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;90,48 Navarra, Comunidad Foral de;K.1.A % of enterprises that apply strong password authentication (1);Industry;96,49 Navarra, Comunidad Foral de;K.1.A % of enterprises that apply strong password authentication (1);Construction;81,31 Navarra, Comunidad Foral de;K.1.A % of enterprises that apply strong password authentication (1);Services;85,68 Navarra, Comunidad Foral de;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;53,08 Navarra, Comunidad Foral de;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;52,65 Navarra, Comunidad Foral de;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;51,81 Navarra, Comunidad Foral de;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;53,75 Navarra, Comunidad Foral de;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;9,7 Navarra, Comunidad Foral de;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;9,34 Navarra, Comunidad Foral de;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;2,88 Navarra, Comunidad Foral de;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;11,21 Navarra, Comunidad Foral de;K.1.D % of enterprises that use external data backup (1);Total Enterprises;63,12 Navarra, Comunidad Foral de;K.1.D % of enterprises that use external data backup (1);Industry;66,8 Navarra, Comunidad Foral de;K.1.D % of enterprises that use external data backup (1);Construction;82,13 Navarra, Comunidad Foral de;K.1.D % of enterprises that use external data backup (1);Services;56,09 Navarra, Comunidad Foral de;K.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;44,57 Navarra, Comunidad Foral de;K.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;44,88 Navarra, Comunidad Foral de;K.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;11,29 Navarra, Comunidad Foral de;K.1.E % of enterprises that use protocols to analyze security incidents (1);Services;49,77 País Vasco;K.1 % of enterprises that use internal security systems;Total Enterprises;89,37 País Vasco;K.1 % of enterprises that use internal security systems;Industry;91,81 País Vasco;K.1 % of enterprises that use internal security systems;Construction;93,48 País Vasco;K.1 % of enterprises that use internal security systems;Services;86,38 País Vasco;K.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;90,33 País Vasco;K.1.A % of enterprises that apply strong password authentication (1);Industry;83,99 País Vasco;K.1.A % of enterprises that apply strong password authentication (1);Construction;100 País Vasco;K.1.A % of enterprises that apply strong password authentication (1);Services;93,72 País Vasco;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;50,97 País Vasco;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;54,23 País Vasco;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;38,01 País Vasco;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;51,14 País Vasco;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;12,82 País Vasco;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;16,1 País Vasco;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;6,08 País Vasco;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;11,48 País Vasco;K.1.D % of enterprises that use external data backup (1);Total Enterprises;63,91 País Vasco;K.1.D % of enterprises that use external data backup (1);Industry;64,98 País Vasco;K.1.D % of enterprises that use external data backup (1);Construction;58,41 País Vasco;K.1.D % of enterprises that use external data backup (1);Services;64,26 País Vasco;K.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;37,73 País Vasco;K.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;39,18 País Vasco;K.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;25,22 País Vasco;K.1.E % of enterprises that use protocols to analyze security incidents (1);Services;39,44 Rioja, La;K.1 % of enterprises that use internal security systems;Total Enterprises;88,9 Rioja, La;K.1 % of enterprises that use internal security systems;Industry;89,14 Rioja, La;K.1 % of enterprises that use internal security systems;Construction;93,43 Rioja, La;K.1 % of enterprises that use internal security systems;Services;87,4 Rioja, La;K.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;94,68 Rioja, La;K.1.A % of enterprises that apply strong password authentication (1);Industry;99,13 Rioja, La;K.1.A % of enterprises that apply strong password authentication (1);Construction;100 Rioja, La;K.1.A % of enterprises that apply strong password authentication (1);Services;87,16 Rioja, La;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;49,47 Rioja, La;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;42,56 Rioja, La;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;52,78 Rioja, La;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;57,87 Rioja, La;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;10,73 Rioja, La;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;13,47 Rioja, La;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;4,15 Rioja, La;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;8,9 Rioja, La;K.1.D % of enterprises that use external data backup (1);Total Enterprises;65,56 Rioja, La;K.1.D % of enterprises that use external data backup (1);Industry;65,66 Rioja, La;K.1.D % of enterprises that use external data backup (1);Construction;69,95 Rioja, La;K.1.D % of enterprises that use external data backup (1);Services;64,19 Rioja, La;K.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;30,92 Rioja, La;K.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;29,5 Rioja, La;K.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;29,38 Rioja, La;K.1.E % of enterprises that use protocols to analyze security incidents (1);Services;33,26 Ceuta;K.1 % of enterprises that use internal security systems;Total Enterprises;77,34 Ceuta;K.1 % of enterprises that use internal security systems;Industry;89,29 Ceuta;K.1 % of enterprises that use internal security systems;Construction;38,13 Ceuta;K.1 % of enterprises that use internal security systems;Services;84,27 Ceuta;K.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;88,83 Ceuta;K.1.A % of enterprises that apply strong password authentication (1);Industry;100 Ceuta;K.1.A % of enterprises that apply strong password authentication (1);Construction;26,23 Ceuta;K.1.A % of enterprises that apply strong password authentication (1);Services;93,33 Ceuta;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;29,04 Ceuta;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;76 Ceuta;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;73,77 Ceuta;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;16,67 Ceuta;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;11,04 Ceuta;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;8 Ceuta;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;0 Ceuta;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;12,67 Ceuta;K.1.D % of enterprises that use external data backup (1);Total Enterprises;63,07 Ceuta;K.1.D % of enterprises that use external data backup (1);Industry;76 Ceuta;K.1.D % of enterprises that use external data backup (1);Construction;0 Ceuta;K.1.D % of enterprises that use external data backup (1);Services;67,33 Ceuta;K.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;24,7 Ceuta;K.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;8 Ceuta;K.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;0 Ceuta;K.1.E % of enterprises that use protocols to analyze security incidents (1);Services;30 Melilla;K.1 % of enterprises that use internal security systems;Total Enterprises;83,61 Melilla;K.1 % of enterprises that use internal security systems;Industry;77,78 Melilla;K.1 % of enterprises that use internal security systems;Construction;100 Melilla;K.1 % of enterprises that use internal security systems;Services;79,89 Melilla;K.1.A % of enterprises that apply strong password authentication (1);Total Enterprises;98,49 Melilla;K.1.A % of enterprises that apply strong password authentication (1);Industry;100 Melilla;K.1.A % of enterprises that apply strong password authentication (1);Construction;100 Melilla;K.1.A % of enterprises that apply strong password authentication (1);Services;97,84 Melilla;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Total Enterprises;32,16 Melilla;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Industry;42,86 Melilla;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Construction;43,48 Melilla;K.1.B % of enterprises that use user identification and authentication with hardware elements (1);Services;27,34 Melilla;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Total Enterprises;20,1 Melilla;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Industry;0 Melilla;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Construction;0 Melilla;K.1.C % of enterprises that use user identification and authentication with biometric elements (1);Services;28,78 Melilla;K.1.D % of enterprises that use external data backup (1);Total Enterprises;32,41 Melilla;K.1.D % of enterprises that use external data backup (1);Industry;42,86 Melilla;K.1.D % of enterprises that use external data backup (1);Construction;57,61 Melilla;K.1.D % of enterprises that use external data backup (1);Services;23,02 Melilla;K.1.E % of enterprises that use protocols to analyze security incidents (1);Total Enterprises;38,57 Melilla;K.1.E % of enterprises that use protocols to analyze security incidents (1);Industry;71,43 Melilla;K.1.E % of enterprises that use protocols to analyze security incidents (1);Construction;21,2 Melilla;K.1.E % of enterprises that use protocols to analyze security incidents (1);Services;41,01