Skip to content
Accessing Data ...
... Please wait
StatBank Denmark
Business
Log on
Help
ITAV8:
Enterprises use of ICT security (10+ employees) by enterprise size, activity (NACE REV2) and topics (DISCONTINUED)
Unit : Per cent
Select
Advanced selection
Information
enterprise size
(5)
activity (NACE REV2)
(6)
topics
(38)
More options...
Sort ascending
Select all
Deselect all
All enterprises (with at least 10 employees)
10-49 employees
50-99 employees
100-249 employees
250 employees and over
More options...
Sort ascending
Select all
Deselect all
All enterprises within the private, non-financial urban trades
10-39 Manufacturing
41-43 Construction
45-56 Trade and transport etc.
58-63 Information and communication
68-74, 77-82, 95.1 Other business services
More options...
Sort ascending
Select all
Deselect all
1. Implemented any kind of ICT security measures (2019 -)
1.1 Having strong password authentication
1.10 Making ICT security tests
1.2 Keeping the software (including operating systems) up-to-date
1.3 Having user identification and authentication via biometric methods
1.4 Making encryption techniques for data, documents or e-mails
1.5 Having data backup to a separate location (including cloud)
1.6 Having network access control
1.7 Having VPN (Virtual Private Network)
1.8 Maintaining log files for analysis after security incidents
1.9 Making ICT risk assessment
2. Implemented any kind of ICT security measures (2015-2018)
2.1 Having a written ICT security policy.
2.10 Having procedure for management of ICT security breach
2.2 Having ICT security and data protection guidelines for employees.
2.3 Having data classification (e.g. access rights)
2.4 Has conducted risk analysis
2.5 Having basic security measures (e.g. antivirus, firewall, back-up)
2.6 Having advanced security measures (e.g. checking logs, penetration tests, security alert system)
2.7 Having requirements to suppliers related to ICT security and data protection.
2.8 Having other ICT security actions
2.9 Having education and training of employees within ICT security and data protection.
3. Experienced difficulties using ICT security solutions in the previous calendar year
4. Experienced ICT security breaches in the previous calendar year
4.1 Have experienced unavailability of ICT services
4.2 Have experienced destruction or corruption of data
4.3 Have experienced disclosure of confidential data
5.1 Ascending level of investments in ICT security in the previous calendar year
5.2 Unchanged level of investments in ICT security in the previous calendar year
5.3 Descending level of investments in ICT security in the previous calendar year
6.1 Own employees carries out the ICT security related activities in your enterprise
6.2 External suppliers carries out the ICT security related activities in your enterprise
7. Having document(s) on measures, practices or procedures on ICT security
7.1 Having document(s) on management of access rights for the usage of ICT
7.2 Having document(s) on storage, protection and access to data
7.3 Having document(s) on procedures to security incidents
7.4 Having document(s) on responsibility of persons employed in the field of ICT
7.5 Having document(s) on training of persons employed in the safe usage of ICT
year
More options...
Sort ascending
Select all
Deselect all
2019
2018
2017
2016
2015
Number of selected data cells for the table:
(select max. 10000)
13-10-2024
Statistics Denmark
,
www.statbank.dk/ITAV8