Milijarda podatkov v podatkovni bazi SiStat

Number of enterprises with 10 or more employees and self-employed that have document(s) on measures, practices or procedures on ICT security in enterprises, by activity (NACE Rev. 2), Slovenia, 2019
Mark your selections and choose between table on screen and file format. Marking tips

For variables marked Select at least one value you need to select at least one value

YEAR Select at least one value

Total: 1 | Selected:

Search

DOCUMENT ON ICT SECURITY Select at least one value

Total: 11 | Selected:

Search

ACTIVITY Select at least one value

Total: 19 | Selected:

Search


Number of selected data cells are:(maximum number allowed is 1,000,000)

Presentation on screen is limited to 1,000 rows and 150 columns


Number of selected cells exceeds the maximum allowed 1,000,000
Contact and information

Information

Latest update
10/21/2022
Contact
Statistical Office of the Republic of Slovenia, T: +386 1 241 64 04, E: gp.surs@gov.si
Unit
number
Next update
9/28/2022
Source
Statistical Office of the Republic of Slovenia
Footnotes

Footnotes

Linked content:
- Methodological explanations
DOCUMENT ON ICT SECURITY
1 Enterprises have document(s) on measures, practices or procedures on ICT security, e.g. established information security policy
Documents on ICT security and confidentiality of data (information security policies) cover employee training in ICT use, ICT security measures, the evaluation of ICT security measures, plans for updating ICT security documents, etc.
1.3 Document(s) address procedures or rules to prevent or respond to security incidents, e.g. pharming, phishing attacks, ransomware, etc.
Phishing attack – an attempt to illegally obtain online information, e.g. web passwords, usernames, credit card information via email that directs the user to fake websites.
Pharming attack – users are redirected without their knowledge to malicious web pages, even if they enter the correct web page address they would like to visit in the browser. These are most often complete copies of the original websites, so users do not notice it and provide their personal information without hesitation.
Ransomware attack – malware encrypts data on the computer or network. This prevents users from using them. They can regains access to them after paying a certain amount (ransom).