We scan 1023 European websites every week — banking, pharma, e-commerce, government, tech. No individual sites are named. The question isn't who failed. It's which industries are exposed.
55.8/100
Average score
54%
Email spoofable
79%
No DNSSEC
58%
Missing security headers
Security posture by industry — sorted by average score. Click an industry to see its detailed breakdown.
| Industry | Sites | Score | Unprotected | Spoofable | Insecure | Grade distribution |
|---|---|---|---|---|---|---|
| Pharma | 40 |
|
55% | 88% | 15% |
C
D
F
|
| Automotive | 20 |
|
60% | 70% | 25% |
B
C
D
F
|
| Banking | 133 |
|
58% | 56% | 35% |
C
D
F
|
| E-Commerce | 180 |
|
61% | 62% | 28% |
C
D
F
|
| Government | 101 |
|
53% | 66% | 28% |
C
D
F
|
| Media | 140 |
|
71% | 71% | 11% |
C
D
|
| Technology | 274 |
|
54% | 40% | 18% |
B
C
D
F
|
| Insurance | 43 |
|
44% | 47% | 26% |
B
C
D
F
|
| Regulatory | 92 |
|
52% | 29% | 15% |
B
C
D
|
Sorted by average security score (lowest first). Column explanations: Unprotected = missing 3+ critical HTTP headers. Spoofable = no or weak DMARC. Insecure = no HTTPS redirect.
Run a free security scan — no account needed. See your score, grade, and how you compare to your industry.
Scan your website nowThe most common security gaps across 1023 European websites — and the regulations they violate.
58%
Visitors are exposed to clickjacking, XSS, and content injection because critical HTTP headers are missing.
54%
Emails from these domains can be spoofed — invoices, password resets, anything. No DMARC enforcement.
79%
DNS responses are unsigned. Attackers can redirect visitors to fake sites without detection.
How we scan, what we measure, how scores are computed.
Every site is scanned weekly across these security dimensions. Scores are computed on a 100-point scale.
HSTS, CSP, X-Frame-Options, X-Content-Type, Referrer-Policy, Permissions-Policy
Key strength, signature algorithm, chain depth, TLS version, forward secrecy
HTTP-to-HTTPS redirect for all visitors
SPF, DKIM (key strength), DMARC (policy enforcement)
DNSSEC signing, CAA records, DoH consistency, DANE/TLSA
Vulnerability disclosure contact per RFC 9116
Inbound email TLS enforcement (enforce vs. testing mode)
SMTP TLS failure reporting endpoint
No server version disclosure, no X-Powered-By, restricted CORS
Data based on automated weekly scans of publicly accessible websites.
No individual site names are disclosed. All statistics are anonymised by industry.
Regulatory references indicate which requirements relate to each finding. They do not assert non-compliance of any specific organisation.
Run a free security scan and see your score, your grade, and how you compare — in 30 seconds, no account needed.
This data is also available as JSON via the Benchmark API.