All enterprises with 10+ employees |
|
|
|
|
|
|
|
Security measures |
|
|
|
Digital signature |
10 |
6 |
7 |
Other methods for identification than digital signature, e.g. PIN code |
13 |
10 |
13 |
Cryptation out of consideration to confidentiality |
8 |
7 |
11 |
Physical access restriction to critical IT-equipment |
31 |
36 |
49 |
Emergency electricity supply |
38 |
36 |
46 |
Keeping back-up in other locality than the working premises |
63 |
61 |
68 |
Server with secure connection (supported by safety protocols, e.g. SSL or SHTTP) |
26 |
33 |
51 |
Fire walls |
54 |
66 |
80 |
Virus control and protection software |
81 |
85 |
88 |
Subscription to a security service (e.g. anti-virus software or software which warns about attacks |
57 |
68 |
82 |
Constant IT safety education of employees |
14 |
13 |
23 |
IT security policy approved by management |
: |
23 |
46 |
Formally appointed person responsible for IT security |
: |
28 |
39 |
Emergency plan updated during latest two years |
: |
14 |
27 |
IT security guidance for all users, updated during latest two years |
: |
12 |
25 |
Filtering of incoming e-mail (spam protection) |
: |
44 |
70 |
Updated any safety precautions, e.g. anti-virus programs, during the latest three months |
70 |
81 |
82 |
|