div.et_pb_section.et_pb_section_3,div.et_pb_section.et_pb_section_4{background-image:url(https://zej.ygs.mybluehost.me/website_6338c1da/wp-content/uploads/2024/10/cyber-security-17.png),radial-gradient(circle at top right,#0090d3 0%,#0090d3 100%)!important}.et_pb_section_3,.et_pb_section_4{overflow-x:visible;overflow-y:visible;z-index:10;position:relative}.et_pb_section_3.et_pb_section,.et_pb_section_4.et_pb_section{padding-top:6vw;padding-bottom:6vw;margin-top:0px}.et_pb_row_1{background-color:#FFFFFF;border-radius:10px 10px 10px 10px;overflow:hidden;box-shadow:0px 40px 60px -8px rgba(10,45,97,0.48)}.et_pb_row_1.et_pb_row{padding-top:0px!important;padding-bottom:0px!important;margin-top:0px!important;margin-right:auto!important;margin-bottom:0px!important;margin-left:auto!important;padding-top:0px;padding-bottom:0px}.et_pb_text_0 h1,.et_pb_text_1 h1{font-family:'Fjalla One',Helvetica,Arial,Lucida,sans-serif;font-weight:500}.et_pb_text_0 h2,.et_pb_text_1 h2{font-family:'Fjalla One',Helvetica,Arial,Lucida,sans-serif;font-size:56px;line-height:1.1em}.et_pb_text_0{padding-top:0px!important;padding-right:0px!important;padding-bottom:21px!important;padding-left:0px!important;margin-top:0px!important;margin-right:0px!important;margin-bottom:0px!important;margin-left:0px!important;z-index:500;position:relative;top:0px;bottom:auto;left:0px;right:auto}.et_pb_blurb_0.et_pb_blurb .et_pb_module_header,.et_pb_blurb_0.et_pb_blurb .et_pb_module_header a,.et_pb_blurb_1.et_pb_blurb .et_pb_module_header,.et_pb_blurb_1.et_pb_blurb .et_pb_module_header a{font-family:'Overpass',Helvetica,Arial,Lucida,sans-serif;font-weight:900;line-height:1.4em}.et_pb_blurb_0.et_pb_blurb p,.et_pb_blurb_1.et_pb_blurb p{line-height:1.8em}.et_pb_blurb_0.et_pb_blurb{font-family:'Overpass',Helvetica,Arial,Lucida,sans-serif;font-weight:300;line-height:1.8em}.et_pb_blurb_0 .et-pb-icon,.et_pb_blurb_1 .et-pb-icon{font-size:24px;color:#0090D3;font-family:ETmodules!important;font-weight:400!important}.et_pb_blurb_1.et_pb_blurb{font-family:'Overpass',Helvetica,Arial,Lucida,sans-serif;font-weight:700;font-size:17px;color:#000000!important;line-height:1.8em}.et_pb_blurb_1 .et_pb_blurb_content{max-width:831px}.et_pb_text_1{padding-left:0px!important;margin-left:-120px!important}.et_pb_text_2.et_pb_text{color:#000000!important}.et_pb_text_2{line-height:1.8em;font-family:'Overpass',Helvetica,Arial,Lucida,sans-serif;font-weight:300;font-size:17px;line-height:1.8em;margin-left:-90px!important}.et_pb_button_0_wrapper .et_pb_button_0,.et_pb_button_0_wrapper .et_pb_button_0:hover{padding-top:20px!important;padding-right:30px!important;padding-bottom:20px!important;padding-left:30px!important}.et_pb_button_0_wrapper{margin-left:-90px!important}body #page-container .et_pb_section .et_pb_button_0{color:#ffffff!important;border-width:0px!important;border-radius:100px;font-size:14px;font-family:'Overpass',Helvetica,Arial,Lucida,sans-serif!important;font-weight:900!important;text-transform:uppercase!important;background-image:radial-gradient(circle at top right,#034da0 0%,#0090d3 100%);background-color:#034DA0}body #page-container .et_pb_section .et_pb_button_0:before,body #page-container .et_pb_section .et_pb_button_0:after{display:none!important}.et_pb_button_0{box-shadow:0px 0px 0px -10px rgba(25,114,255,0.4);transition:box-shadow 300ms ease 0ms}.et_pb_button_0:hover{box-shadow:0px 10px 40px -10px rgba(25,114,255,0.4)}.et_pb_button_0,.et_pb_button_0:after{transition:all 300ms ease 0ms}.et_pb_column_1{padding-top:60px;padding-right:40px;padding-bottom:60px;padding-left:40px}.et_pb_column_2{background-size:contain;background-position:left bottom 0px;background-image:url(https://zej.ygs.mybluehost.me/website_6338c1da/wp-content/uploads/2024/10/cyber-security-010-1.png),radial-gradient(circle at bottom right,#e09c0b 0%,#f4ecb0 99%);padding-top:60px;padding-right:40px;padding-bottom:60px;padding-left:20%}@media only screen and (max-width:980px){.et_pb_text_0 h2,.et_pb_text_1 h2{font-size:38px}.et_pb_column_2{background-position:left top;background-image:url(http://zaib.sandbox.etdevs.com/divi/wp-content/uploads/sites/2/2019/06/cyber-security-11.png),radial-gradient(circle at bottom right,#e09c0b 0%,#f4ecb0 99%);background-color:initial;padding-top:80px;padding-left:40px}}@media only screen and (min-width:768px) and (max-width:980px){.et_pb_column_2{display:none!important}}@media only screen and (max-width:767px){.et_pb_text_0 h2,.et_pb_text_1 h2{font-size:26px}.et_pb_column_2{display:none!important}.et_pb_text_2{font-size:14px}}