div.et_pb_section.et_pb_section_0{background-image:url(https://maint.wp-prosupport.com/wp-content/uploads/2023/04/cyber-security-08.png),radial-gradient(circle at top,#00ffd8 0%,#0029e2 100%)!important}.et_pb_section_0.et_pb_section{padding-bottom:0px;background-color:#f1fafe!important}.et_pb_image_0{margin-left:-20vw!important;text-align:left;margin-left:0}.et_pb_text_0 h1{font-family:'Overpass',Helvetica,Arial,Lucida,sans-serif;font-weight:900;font-size:52px}.et_pb_text_1{line-height:1.8em;font-family:'Overpass',Helvetica,Arial,Lucida,sans-serif;font-weight:300;font-size:20px;line-height:1.8em}.et_pb_button_0,.et_pb_button_0:after{transition:all 300ms ease 0ms}@media only screen and (max-width:980px){div.et_pb_section.et_pb_section_0{background-position:right 0px center}.et_pb_section_0.et_pb_section{background-color:#f1fafe!important}.et_pb_image_0{margin-left:0vw!important;max-width:400px}.et_pb_image_0 .et_pb_image_wrap img{width:auto}.et_pb_text_0 h1{font-size:54px}}@media only screen and (max-width:767px){div.et_pb_section.et_pb_section_0{background-image:initial!important}.et_pb_section_0.et_pb_section{background-color:#f1fafe!important}.et_pb_image_0{max-width:200px}.et_pb_image_0 .et_pb_image_wrap img{width:auto}.et_pb_text_0 h1{font-size:32px}.et_pb_text_1{font-size:14px}}