Industrial espionage
Industrial espionage Very unlikely
Industrial espionage unlikely
Industrial espionage likely
Industrial espionage very likely
Industrial espionage don´t know
Access to data by government intelligence agencies
Access to data by government intelligence agencies Very unlikely
Access to data by government intelligence agencies unlikely
Access to data by government intelligence agencies likely
Access to data by government intelligence agencies very likely
Access to data by government intelligence agencies don´t know
Financially driven cyberattacks (e.g., ransomware, crypto-mining).
Financially driven cyberattacks (e.g., ransomware, crypto-mining). Very unlikely
Financially driven cyberattacks (e.g., ransomware, crypto-mining). unlikely
Financially driven cyberattacks (e.g., ransomware, crypto-mining). likely
Financially driven cyberattacks (e.g., ransomware, crypto-mining). very likely
Financially driven cyberattacks (e.g., ransomware, crypto-mining). don´t know
Risk potential due to negligence on the part of internal employees
Risk potential due to negligence on the part of internal employees Very unlikely
Risk potential due to negligence on the part of internal employees unlikely
Risk potential due to negligence on the part of internal employees likely
Risk potential due to negligence on the part of internal employees very likely
Risk potential due to negligence on the part of internal employees don´t know
Data theft / sabotage by own (former) employees
Data theft / sabotage by own (former) employees Very unlikely
Data theft / sabotage by own (former) employees unlikely
Data theft / sabotage by own (former) employees likely
Data theft / sabotage by own (former) employees very likely
Data theft / sabotage by own (former) employees don´t know
Theft of digital identities / theft of access data
Theft of digital identities / theft of access data Very unlikely
Theft of digital identities / theft of access data unlikely
Theft of digital identities / theft of access data likely
Theft of digital identities / theft of access data very likely
Theft of digital identities / theft of access data don´t know
Attacks on the supply chain
Attacks on the supply chain Very unlikely
Attacks on the supply chain unlikely
Attacks on the supply chain likely
Attacks on the supply chain very likely
Attacks on the supply chain don´t know
Attacks from the supply chain / from partners
Attacks from the supply chain / from partners Very unlikely
Attacks from the supply chain / from partners unlikely
Attacks from the supply chain / from partners likely
Attacks from the supply chain / from partners very likely
Attacks from the supply chain / from partners don´t know