<html><head><meta name="color-scheme" content="light dark"></head><body><pre style="word-wrap: break-word; white-space: pre-wrap;">div.et_pb_section.et_pb_section_3{background-image:url(https://crmhelix.com/wp-content/uploads/2025/02/cyber-security-17.png),radial-gradient(circle at top right,#3122b2 0%,#00ffd8 100%)!important}.et_pb_section_3{overflow-x:visible;overflow-y:visible;z-index:10;position:relative}.et_pb_section_3.et_pb_section{padding-bottom:10vw}.et_pb_row_5{background-color:#ffffff;border-radius:10px 10px 10px 10px;overflow:hidden;box-shadow:0px 40px 60px -8px rgba(10,45,97,0.48);transform:translateX(5px) translateY(-93px)}.et_pb_row_5.et_pb_row{padding-top:0px!important;padding-bottom:0px!important;margin-top:-146px!important;margin-right:auto!important;margin-bottom:-2px!important;margin-left:auto!important;padding-top:0px;padding-bottom:0px}.et_pb_text_3 h2,.et_pb_text_4 h2{font-family:'Overpass',Helvetica,Arial,Lucida,sans-serif;font-weight:900;font-size:56px;line-height:1.1em}.et_pb_blurb_10.et_pb_blurb .et_pb_module_header,.et_pb_blurb_10.et_pb_blurb .et_pb_module_header a,.et_pb_blurb_11.et_pb_blurb .et_pb_module_header,.et_pb_blurb_11.et_pb_blurb .et_pb_module_header a{font-family:'Overpass',Helvetica,Arial,Lucida,sans-serif;font-weight:900;line-height:1.4em}.et_pb_blurb_10.et_pb_blurb p,.et_pb_blurb_11.et_pb_blurb p{line-height:1.8em}.et_pb_blurb_10.et_pb_blurb,.et_pb_blurb_11.et_pb_blurb{font-family:'Overpass',Helvetica,Arial,Lucida,sans-serif;font-weight:300;line-height:1.8em}.et_pb_blurb_10 .et-pb-icon,.et_pb_blurb_11 .et-pb-icon{font-size:24px;color:#006ac1;font-family:ETmodules!important;font-weight:400!important}.et_pb_text_5.et_pb_text{color:#0a2d61!important}.et_pb_text_5{line-height:1.8em;font-family:'Overpass',Helvetica,Arial,Lucida,sans-serif;font-weight:300;font-size:17px;line-height:1.8em}.et_pb_button_1_wrapper .et_pb_button_1,.et_pb_button_1_wrapper .et_pb_button_1:hover{padding-top:20px!important;padding-right:30px!important;padding-bottom:20px!important;padding-left:30px!important}body #page-container .et_pb_section .et_pb_button_1{color:#ffffff!important;border-width:0px!important;border-radius:100px;font-size:14px;font-family:'Overpass',Helvetica,Arial,Lucida,sans-serif!important;font-weight:900!important;text-transform:uppercase!important;background-image:radial-gradient(circle at top right,#003070 0%,#001f4c 100%)}body #page-container .et_pb_section .et_pb_button_1:before,body #page-container .et_pb_section .et_pb_button_1:after{display:none!important}.et_pb_button_1{box-shadow:0px 0px 0px -10px rgba(25,114,255,0.4);transition:box-shadow 300ms ease 0ms}.et_pb_button_1:hover{box-shadow:0px 10px 40px -10px rgba(25,114,255,0.4)}.et_pb_button_1,.et_pb_button_1:after{transition:all 300ms ease 0ms}.et_pb_column_11{padding-top:60px;padding-right:40px;padding-bottom:60px;padding-left:40px}.et_pb_column_12{background-size:contain;background-position:left bottom 0px;background-image:url(https://crmhelix.com/wp-content/uploads/2025/02/cyber-security-010-1.png),radial-gradient(circle at top right,#00f6ff 0%,#00ffbf 100%);padding-top:60px;padding-right:40px;padding-bottom:60px;padding-left:20%}@media only screen and (max-width:980px){.et_pb_text_3 h2,.et_pb_text_4 h2{font-size:38px}.et_pb_column_12{background-position:left top;background-image:url(http://zaib.sandbox.etdevs.com/divi/wp-content/uploads/sites/2/2019/06/cyber-security-11.png),radial-gradient(circle at top right,#00f6ff 0%,#00ffbf 100%);background-color:initial;padding-top:80px;padding-left:40px}}@media only screen and (max-width:767px){.et_pb_text_3 h2,.et_pb_text_4 h2{font-size:26px}.et_pb_text_5{font-size:14px}}</pre></body></html>