#footer-widgets .footer-widget a,#footer-widgets .footer-widget li a,#footer-widgets .footer-widget li a:hover{color:#ffffff}.footer-widget{color:#ffffff}@media only screen and (min-width:1350px){.et_pb_row{padding:27px 0}.et_pb_section{padding:54px 0}.single.et_pb_pagebuilder_layout.et_full_width_page .et_post_meta_wrapper{padding-top:81px}.et_pb_section.et_pb_section_first{padding-top:inherit}.et_pb_fullwidth_section{padding:0}}.et_pb_fullwidth_header_0.et_pb_fullwidth_header .header-content h1{font-family:'Nova Square',cursive;font-size:36px}.et_pb_fullwidth_header_0.et_pb_fullwidth_header .et_pb_fullwidth_header_overlay{background-color:#9adeea}.et_pb_fullwidth_header.et_pb_fullwidth_header_1{background-image:url(https://cybersecuritystudio.com/wp-content/uploads/2017/08/44845214_m.jpg)}.et_pb_image_0{text-align:center}.et_pb_image_1{margin-top:70px!important;text-align:center}