.page-cybersecurity{width:100%;overflow:hidden}.page-cybersecurity ul{margin:0;padding:0}.page-cybersecurity ul li{list-style:none}.page-cybersecurity .tabContainer{background:#ccc;border-radius:3px;flex-wrap:nowrap;align-items:flex-start;margin:24px 20px 32px;padding:2px;line-height:34px;display:flex}.page-cybersecurity .tabContainer .tablink{color:#fff;text-align:center;background:#ccc;border-radius:3px;flex:auto;margin:1px;padding:0 8px;font-size:12px;font-weight:700}.page-cybersecurity .tabContainer .tablink.active{background:#2a3795}@media screen and (min-width:450px){.page-cybersecurity .tabContainer{width:370px;margin:28px auto 40px}}.page-cybersecurity .section-intro h3,.page-cybersecurity .section-whyImportant h3,.page-cybersecurity .section-commonCyberattacks h3,.page-cybersecurity .section-cyber-to-ud h3,.page-cybersecurity .section-howToProtect h3,.page-cybersecurity .section-successfulStories h3,.page-cybersecurity .section-banner h3,.page-cybersecurity .cta-group h3,.page-cybersecurity .subscription-form h3{color:#3c3c3c;margin-bottom:8px;font-size:15px;position:relative}.page-cybersecurity .section-intro h3:after,.page-cybersecurity .section-whyImportant h3:after,.page-cybersecurity .section-commonCyberattacks h3:after,.page-cybersecurity .section-cyber-to-ud h3:after,.page-cybersecurity .section-howToProtect h3:after,.page-cybersecurity .section-successfulStories h3:after,.page-cybersecurity .section-banner h3:after,.page-cybersecurity .cta-group h3:after,.page-cybersecurity .subscription-form h3:after{content:"";border-top:1px solid #ebebeb;width:100%;margin:0 0 0 10px;position:absolute;top:50%}.page-cybersecurity .section-intro p,.page-cybersecurity .section-whyImportant p,.page-cybersecurity .section-commonCyberattacks p,.page-cybersecurity .section-cyber-to-ud p,.page-cybersecurity .section-howToProtect p,.page-cybersecurity .section-successfulStories p,.page-cybersecurity .section-banner p,.page-cybersecurity .cta-group p,.page-cybersecurity .subscription-form p{color:#3c3c3c;font-size:13px}.page-cybersecurity .section-intro .content-container,.page-cybersecurity .section-whyImportant .content-container,.page-cybersecurity .section-commonCyberattacks .content-container,.page-cybersecurity .section-cyber-to-ud .content-container,.page-cybersecurity .section-howToProtect .content-container,.page-cybersecurity .section-successfulStories .content-container,.page-cybersecurity .section-banner .content-container,.page-cybersecurity .cta-group .content-container,.page-cybersecurity .subscription-form .content-container{margin:0 20px}.page-cybersecurity .section-intro{margin-bottom:32px}.page-cybersecurity .section-intro .content-container h1{color:#2a3795;margin:0;font-size:26px;font-weight:300;line-height:100%}.page-cybersecurity .section-intro .content-container h2{color:#3c3c3c;margin:8px 0;font-size:16px;font-weight:700}.page-cybersecurity .section-intro .content-container p{font-size:16px}.page-cybersecurity .section-intro .content-container .areYouAfraid-grp .image-container{width:150px;height:150px;margin:16px auto;display:block}.page-cybersecurity .section-intro .content-container .areYouAfraid-grp .image-cybersecurity{background:url(/images/cybersecurity/image-cybersecurity.svg) 50%/contain no-repeat}.page-cybersecurity .section-intro .content-container .areYouAfraid-grp .questioning-content{margin-bottom:16px}.page-cybersecurity .section-intro .content-container .areYouAfraid-grp .questioning-content ul li{color:#3c3c3c;font-size:14px}.page-cybersecurity .section-intro .content-container .areYouAfraid-grp .questioning-content ul li:before{content:"";background:#2a3795;border-radius:99px;width:6px;height:6px;margin-right:5px;display:inline-block}.page-cybersecurity .section-whyImportant{padding-bottom:16px}.page-cybersecurity .section-whyImportant .stat-container{grid-template-columns:repeat(2,minmax(0,1fr));margin:16px 0;display:grid}.page-cybersecurity .section-whyImportant .stat-container .stat-content{text-align:center;border:none;flex-direction:column;justify-content:center;align-items:center;width:auto;padding:8px;display:flex}.page-cybersecurity .section-whyImportant .stat-container .stat-content h4{color:#3c3c3c;text-align:center;font-size:12px}.page-cybersecurity .section-whyImportant .stat-container .stat-content h4 b{color:#47b549}.page-cybersecurity .section-whyImportant .stat-container .stat-content p{color:#9c9c9c;text-align:center;font-size:36px;font-weight:300}.page-cybersecurity .section-whyImportant .stat-container .stat-content p b{color:#db1a33;font-weight:300}.page-cybersecurity .section-whyImportant .stat-container .stat-content p span{font-size:12px}.page-cybersecurity .section-whyImportant .stat-container .stat-content.stat-content:nth-child(3) h4{height:72px}.page-cybersecurity .section-whyImportant .stat-container .stat-content.stat-content:nth-child(3) p{color:#47b549}.page-cybersecurity .section-whyImportant .stat-container .stat-content.stat-content:nth-child(3) p:before{content:"";background:url(/images/cybersecurity/icon-increase.svg) 50% no-repeat;width:7px;height:13px;margin-right:5px;display:inline-block;transform:rotate(180deg)}.page-cybersecurity .section-whyImportant .stat-container .stat-content.stat-content:last-child h4 b{color:#db1a33}.page-cybersecurity .section-commonCyberattacks{margin:32px 0 48px}.page-cybersecurity .section-commonCyberattacks .content-container .commonCyberattacks-list{flex-wrap:wrap;display:flex}.page-cybersecurity .section-commonCyberattacks .content-container .commonCyberattacks-list .commonCyberattacks-container{flex:auto;align-items:center;width:45%;padding:8px;display:inline-flex}.page-cybersecurity .section-commonCyberattacks .content-container .commonCyberattacks-list .commonCyberattacks-container p{max-width:105px}.page-cybersecurity .section-commonCyberattacks .content-container .commonCyberattacks-list .commonCyberattacks-container .icon-container{width:46px;height:46px;margin-right:8px;display:block}.page-cybersecurity .section-commonCyberattacks .content-container .commonCyberattacks-list .commonCyberattacks-container .icon-DoS{background:url(/images/cybersecurity/icon-Dos.svg) 50%/contain no-repeat}.page-cybersecurity .section-commonCyberattacks .content-container .commonCyberattacks-list .commonCyberattacks-container .icon-phishing{background:url(/images/cybersecurity/icon-phishing.svg) 50%/contain no-repeat}.page-cybersecurity .section-commonCyberattacks .content-container .commonCyberattacks-list .commonCyberattacks-container .icon-socialEngineering{background:url(/images/cybersecurity/icon-socialEngineering.svg) 50%/contain no-repeat}.page-cybersecurity .section-commonCyberattacks .content-container .commonCyberattacks-list .commonCyberattacks-container .icon-malware{background:url(/images/cybersecurity/icon-malware.svg) 50%/contain no-repeat}.page-cybersecurity .section-commonCyberattacks .content-container .commonCyberattacks-list .commonCyberattacks-container .icon-ransomware{background:url(/images/cybersecurity/icon-ransomware.svg) 50%/contain no-repeat}.page-cybersecurity .section-commonCyberattacks .content-container .commonCyberattacks-list .commonCyberattacks-container .icon-manInMiddle{background:url(/images/cybersecurity/icon-manInMiddle.svg) 50%/contain no-repeat}.page-cybersecurity .section-commonCyberattacks .content-container .commonCyberattacks-list .commonCyberattacks-container .icon-XSS{background:url(/images/cybersecurity/icon-XSS.svg) 50%/contain no-repeat}.page-cybersecurity .section-commonCyberattacks .content-container .commonCyberattacks-list .commonCyberattacks-container .icon-SQL{background:url(/images/cybersecurity/icon-SQL.svg) 50%/contain no-repeat}.page-cybersecurity .section-commonCyberattacks .content-container .commonCyberattacks-list .commonCyberattacks-container.commonCyberattacks-container:nth-child(odd){border-bottom:1px solid #ebebeb;border-right:1px solid #ebebeb}.page-cybersecurity .section-commonCyberattacks .content-container .commonCyberattacks-list .commonCyberattacks-container.commonCyberattacks-container:nth-child(2n){border-bottom:1px solid #ebebeb}.page-cybersecurity .section-commonCyberattacks .content-container .commonCyberattacks-list .commonCyberattacks-container.commonCyberattacks-container:nth-child(7),.page-cybersecurity .section-commonCyberattacks .content-container .commonCyberattacks-list .commonCyberattacks-container.commonCyberattacks-container:nth-child(8){border-bottom:none}.page-cybersecurity .section-cyber-to-ud .content-container{margin:16px 20px;padding:12px}.page-cybersecurity .section-cyber-to-ud .content-container h4{color:#47b549}.page-cybersecurity .section-cyber-to-ud .content-container h4.title{font-size:15px}.page-cybersecurity .section-cyber-to-ud .content-container .ciaTriad-grp .ciaTriad-content{padding-bottom:16px}.page-cybersecurity .section-cyber-to-ud .content-container .ciaTriad-grp .ciaTriad-content .line-confidentiality,.page-cybersecurity .section-cyber-to-ud .content-container .ciaTriad-grp .ciaTriad-content .line-integrity,.page-cybersecurity .section-cyber-to-ud .content-container .ciaTriad-grp .ciaTriad-content .line-availability{display:none}.page-cybersecurity .section-cyber-to-ud .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-confidentiality h3,.page-cybersecurity .section-cyber-to-ud .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-integrity h3,.page-cybersecurity .section-cyber-to-ud .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-availability h3{color:#47b549;margin-bottom:0;margin-left:30px;position:relative}.page-cybersecurity .section-cyber-to-ud .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-confidentiality h3:after,.page-cybersecurity .section-cyber-to-ud .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-integrity h3:after,.page-cybersecurity .section-cyber-to-ud .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-availability h3:after{content:"";border:none!important}.page-cybersecurity .section-cyber-to-ud .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-confidentiality p,.page-cybersecurity .section-cyber-to-ud .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-integrity p,.page-cybersecurity .section-cyber-to-ud .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-availability p{margin-bottom:16px;margin-left:30px;font-size:13px}.page-cybersecurity .section-cyber-to-ud .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-confidentiality h3:before{content:"";background:url(/images/cybersecurity/icon-confidentiality.svg) 50%/contain no-repeat;width:25px;height:25px;display:inline-block;position:absolute;left:-30px}.page-cybersecurity .section-cyber-to-ud .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-integrity h3:before{content:"";background:url(/images/cybersecurity/icon-integrity.svg) 50%/contain no-repeat;width:25px;height:25px;display:inline-block;position:absolute;left:-30px}.page-cybersecurity .section-cyber-to-ud .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-availability h3:before{content:"";background:url(/images/cybersecurity/icon-availability.svg) 50%/contain no-repeat;width:25px;height:25px;display:inline-block;position:absolute;left:-30px}.page-cybersecurity .section-cyber-to-ud .content-container .walk-our-talk p{margin-bottom:16px;font-size:13px}.page-cybersecurity .section-cyber-to-ud .content-container .walk-our-talk .cve-group{margin-bottom:24px}.page-cybersecurity .section-cyber-to-ud .content-container .walk-our-talk .cve-group .container{width:50%;display:inline-block}.page-cybersecurity .section-cyber-to-ud .content-container .walk-our-talk .cve-group p{text-align:center;margin:0}.page-cybersecurity .section-cyber-to-ud .content-container .walk-our-talk .cve-group p span{color:#f5a706;display:block}.page-cybersecurity .section-cyber-to-ud .content-container .walk-our-talk .awards{text-align:center;color:#9c9c9c;margin-bottom:24px;font-size:15px;font-weight:700;text-decoration-line:underline;display:block}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore{background:linear-gradient(90deg,#337e57 -10.39%,#28aa2e 92.97%);padding:16px 16px 56px;position:relative}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore h4{color:#fff;margin-bottom:10px;font-size:15px;font-weight:700;line-height:22px}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore p{color:#fff;margin-bottom:16px;font-size:13px;line-height:19px}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .learnmore-btn{color:#47b549;text-align:center;background:#fff;border-radius:3px;width:100%;margin-bottom:16px;padding:9px;font-size:14px;font-weight:700;display:block}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .graphic-icon{justify-content:center;height:auto;min-height:113px;display:flex;position:relative}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .graphic-icon .graphic-grp{width:192px;height:113px;position:relative;top:auto;right:auto}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .graphic-icon .graphic-grp .mobile{display:block}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .graphic-icon .graphic-grp .desktop{display:none}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .graphic-icon .graphic-grp .banner-icon-mssp{background:url(/images/cybersecurity/banner-icon-mssp.svg) 50%/contain no-repeat;width:53px;height:63px;position:absolute;bottom:0;right:40%}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .graphic-icon .graphic-grp .banner-icon-mssp .banner-icon-cog{background:url(/images/cybersecurity/banner-icon-mssp-cog.svg) 50% no-repeat;width:40px;height:40px;animation:4s linear infinite spin;position:absolute;top:-6px;right:-6px}@keyframes spin{0%{transform:rotate(0)}to{transform:rotate(360deg)}}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .graphic-icon .graphic-grp .banner-icon-scanning{background:url(/images/cybersecurity/banner-icon-scanning.svg) 50%/contain no-repeat;width:48px;height:48px;position:absolute;bottom:0}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .graphic-icon .graphic-grp .banner-icon-protect{background:url(/images/cybersecurity/banner-icon-protect.svg) 50%/contain no-repeat;width:25px;height:32px;position:absolute;top:0;left:33px}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .graphic-icon .graphic-grp .banner-icon-report{background:url(/images/cybersecurity/banner-icon-report.svg) 50%/contain no-repeat;width:27px;height:39px;position:absolute;top:20%;right:13px}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .graphic-icon .graphic-grp .banner-line-mssp-protect{stroke-dasharray:4;animation:30s linear infinite dash-animation_reverse;position:absolute;top:35px;left:43px}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .graphic-icon .graphic-grp .banner-line-horizontal_1,.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .graphic-icon .graphic-grp .banner-line-horizontal_2{stroke-dasharray:4;position:absolute}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .graphic-icon .graphic-grp .banner-line-horizontal_1{animation:30s linear infinite dash-animation;display:none;bottom:2px;left:26px}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .graphic-icon .graphic-grp .banner-line-horizontal_2{animation:30s linear infinite dash-animation_reverse;bottom:27px;right:27px}@keyframes dash-animation{to{stroke-dashoffset:-1000px}}@keyframes dash-animation_reverse{to{stroke-dashoffset:1000px}}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .udlogo{background:url(/images/cybersecurity/ud-logo-white.svg) 50% no-repeat;width:18px;height:14px;display:block;position:absolute;bottom:16px}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .udlogo:after{content:"UD Security";color:#fff;width:111px;margin-left:23px;font-size:13px;font-weight:300;position:absolute;top:-1px}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .udlogo.tc:after{content:"UD 網絡安全"}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .udlogo.sc:after{content:"UD 网络安全"}.page-cybersecurity .section-howToProtect{margin-top:48px;padding-bottom:16px}.page-cybersecurity .section-howToProtect .content-container h3:after{border:none}.page-cybersecurity .section-howToProtect .content-container .securityService-list{grid-template-columns:1fr;gap:12px;margin-top:16px;display:grid}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card{border:none;border-radius:3px;flex-direction:column;justify-content:center;align-items:stretch;width:100%;padding:12px;display:flex}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card h4{color:#47b549;margin:0;font-size:14px}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card p{color:#6c6c6c;width:100%;margin:10px 0 0;padding:6px 0 0;font-size:12px}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card .securityService-desc{text-align:center;width:100%}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card .securityService-head{justify-content:center;align-items:center;gap:14px;display:flex}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card .icon-container{flex:0 0 48px;width:48px;height:48px;display:block}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card .icon-incidentResponse{background:url(/images/cybersecurity/icon-incidentResponse_green.svg) 50%/contain no-repeat}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card .icon-ddos{background:url(/images/cybersecurity/icon-ddos_green.svg) 50%/contain no-repeat}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card .icon-pentest{background:url(/images/cybersecurity/icon-pentest_green.svg) 50%/contain no-repeat}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card .icon-regularUpdate{background:url(/images/cybersecurity/icon-regularUpdate_green.svg) 50% no-repeat}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card .icon-firewall{background:url(/images/cybersecurity/icon-firewall_green.svg) 50%/contain no-repeat}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card .icon-phishing{background:url(/images/cybersecurity/icon-phishing_green.svg) 50% no-repeat}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card .icon-SSL{background:url(/images/cybersecurity/icon-SSL_green.svg) 50%/contain no-repeat}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card.highlight,.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card:hover{background:#47b549;border:1px solid #47b549;border-right:none}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card.highlight h4,.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card:hover h4,.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card.highlight p,.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card:hover p{color:#fff}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card.highlight:first-child .icon-incidentResponse,.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card:hover:first-child .icon-incidentResponse{background:url(/images/cybersecurity/icon-incidentResponse_white.svg) 50%/contain no-repeat}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card.highlight:nth-child(2) .icon-ddos,.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card:hover:nth-child(2) .icon-ddos{background:url(/images/cybersecurity/icon-ddos_white.svg) 50%/contain no-repeat}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card.highlight:nth-child(3) .icon-pentest,.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card:hover:nth-child(3) .icon-pentest{background:url(/images/cybersecurity/icon-pentest_white.svg) 50%/contain no-repeat}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card.highlight:nth-child(4) .icon-regularUpdate,.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card:hover:nth-child(4) .icon-regularUpdate{background:url(/images/cybersecurity/icon-regularUpdate_white.svg) 50%/contain no-repeat;width:35px}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card.highlight:nth-child(5) .icon-firewall,.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card:hover:nth-child(5) .icon-firewall{background:url(/images/cybersecurity/icon-firewall_white.svg) 50%/contain no-repeat}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card.highlight:nth-child(6) .icon-phishing,.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card:hover:nth-child(6) .icon-phishing{background:url(/images/cybersecurity/icon-phishing_white.svg) 50%/contain no-repeat;width:45px}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card.highlight:nth-child(7) .icon-SSL,.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card:hover:nth-child(7) .icon-SSL{background:url(/images/cybersecurity/icon-SSL_white.svg) 50%/contain no-repeat}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card .securityService-desc{flex-basis:80%}.page-cybersecurity .section-howToProtect .content-container .securityService-list .highlight{background:#47b549;border:1px solid #47b549}.page-cybersecurity .section-howToProtect .content-container .securityService-list .highlight h4,.page-cybersecurity .section-howToProtect .content-container .securityService-list .highlight p{color:#fff}.page-cybersecurity .section-howToProtect .content-container .securityService-list .highlight .icon-ddos{background:url(/images/cybersecurity/icon-ddos_white.svg) 50%/contain no-repeat}@media screen and (min-width:768px){.page-cybersecurity .section-howToProtect .content-container .securityService-list{grid-template-columns:repeat(2,minmax(0,1fr))}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card#incidentResponse{grid-column:1/-1}}.page-cybersecurity .section-successfulStories{margin-top:32px;padding-bottom:16px}.page-cybersecurity .section-successfulStories .content-container h3:after{border:none}.page-cybersecurity .section-successfulStories .content-container .successfulStories-list{grid-template-columns:repeat(2,minmax(0,1fr));gap:12px;display:grid}.page-cybersecurity .section-successfulStories .content-container .successfulStories-list .desktop{display:none!important}.page-cybersecurity .section-successfulStories .content-container .successfulStories-list .highlight{border:1px solid #47b549!important}.page-cybersecurity .section-successfulStories .content-container .successfulStories-list .successfulStories-container{border:1px solid #ebebeb;border-radius:3px;margin-bottom:0;padding:12px;display:block}.page-cybersecurity .section-successfulStories .content-container .successfulStories-list .successfulStories-container h3{line-height:100%}.page-cybersecurity .section-successfulStories .content-container .successfulStories-list .successfulStories-container h3:after{border:none}.page-cybersecurity .section-successfulStories .content-container .successfulStories-list .successfulStories-container p{color:#47b549;font-size:12px;line-height:100%}.page-cybersecurity .section-banner{background:linear-gradient(90deg,#337e57 -10.39%,#28aa2e 92.97%);height:auto;min-height:100px;margin-bottom:48px}.page-cybersecurity .section-banner .content-container{flex-wrap:wrap;gap:12px;padding:16px 0;display:flex;position:relative}.page-cybersecurity .section-banner .content-container h4{color:#fff;overflow-wrap:anywhere;max-width:100%;margin:0;font-size:15px;font-weight:300}.page-cybersecurity .section-banner .content-container .udlogo{background:url(/images/cybersecurity/ud-logo-white.svg) 50% no-repeat;width:18px;height:14px;display:block;position:absolute;bottom:16px}.page-cybersecurity .section-banner .content-container .udlogo:after{content:"UD Security | MSSP";color:#fff;width:120px;margin-left:23px;font-size:13px;font-weight:300;position:absolute;top:-1px}.page-cybersecurity .section-banner .content-container .udlogo.tc:after{content:"UD 網絡安全 | MSSP"}.page-cybersecurity .section-banner .content-container .udlogo.sc:after{content:"UD 网络安全 | MSSP"}.page-cybersecurity .section-banner .content-container .graphic-grp{width:110px;height:66px;display:block;position:relative}.page-cybersecurity .section-banner .content-container .graphic-grp .desktop{display:none}.page-cybersecurity .section-banner .content-container .graphic-grp .banner-icon-mssp{background:url(/images/cybersecurity/banner-icon-mssp_mobile.svg) 50% no-repeat;width:27px;height:32px;position:absolute;right:0}.page-cybersecurity .section-banner .content-container .graphic-grp .banner-icon-mssp .banner-icon-cog{background:url(/images/cybersecurity/banner-icon-mssp-cog_mobile.svg) 50% no-repeat;width:18px;height:18px;animation:4s linear infinite spin;position:absolute;top:-2px;right:-4px}.page-cybersecurity .section-banner .content-container .graphic-grp .banner-line-mssp-protect{stroke-dasharray:4;animation:30s linear infinite dash-animation_reverse;position:absolute;top:14px;right:33px}.page-cybersecurity .section-banner .content-container .graphic-grp .banner-icon-scanning{background:url(/images/cybersecurity/banner-icon-scanning_mobile.svg) 50% no-repeat;width:20px;height:20px;position:absolute;bottom:0;left:0}.page-cybersecurity .section-banner .content-container .graphic-grp .banner-icon-protect{background:url(/images/cybersecurity/banner-icon-protect_mobile.svg) 50% no-repeat;width:16px;height:19px;position:absolute;bottom:0;left:40%}.page-cybersecurity .section-banner .content-container .graphic-grp .banner-icon-report{background:url(/images/cybersecurity/banner-icon-report_mobile.svg) 50% no-repeat;width:20px;height:20px;position:absolute;bottom:0;right:2px}.page-cybersecurity .section-banner .content-container .graphic-grp .banner-line-horizontal_1,.page-cybersecurity .section-banner .content-container .graphic-grp .banner-line-horizontal_2{stroke-dasharray:4;position:absolute}.page-cybersecurity .section-banner .content-container .graphic-grp .banner-line-horizontal_1{animation:30s linear infinite dash-animation;bottom:2px;left:26px}.page-cybersecurity .section-banner .content-container .graphic-grp .banner-line-horizontal_2{animation:30s linear infinite dash-animation_reverse;bottom:2px;right:29px}.page-cybersecurity .cta-grp{padding-bottom:16px}.page-cybersecurity .cta-grp .content-container a.btn-serviceEnquiry{color:#fff;text-align:center;background:#2a3795;border-radius:3px;width:354px;margin:8px auto;padding:15px 0;font-size:16px;font-weight:700;text-decoration:none;display:block}.page-cybersecurity .cta-grp .content-container a.btn-onlineQuotation{color:#fff;text-align:center;background:#47b549;border-radius:3px;width:354px;margin:8px auto;padding:15px 0;font-size:16px;font-weight:700;text-decoration:none;display:block}.page-cybersecurity .cta-grp .content-container p{text-align:center;font-size:15px}.page-cybersecurity .cta-grp .content-container p span{color:#2a3795;font-weight:700;display:block}.page-cybersecurity .subscription-form .content-container{margin:0}.page-cybersecurity .subscription-form .content-container h3{color:#47b549;text-align:center;margin-top:16px;font-size:18px}.page-cybersecurity .subscription-form .content-container h3:after{border:none}.page-cybersecurity .subscription-form .content-container form button{color:#fff;background:#47b549;border:none;border-radius:3px;width:100%;height:40px;padding:0;font-size:14px}@media screen and (min-width:450px){.page-cybersecurity{width:100%;margin-bottom:100px}.page-cybersecurity .section-intro h3,.page-cybersecurity .section-whyImportant h3,.page-cybersecurity .section-commonCyberattacks h3,.page-cybersecurity .section-howToProtect h3,.page-cybersecurity .section-successfulStories h3,.page-cybersecurity .section-banner h3,.page-cybersecurity .cta-group h3,.page-cybersecurity .subscription-form h3{margin-bottom:10px;font-size:16px}.page-cybersecurity .section-intro p,.page-cybersecurity .section-whyImportant p,.page-cybersecurity .section-commonCyberattacks p,.page-cybersecurity .section-howToProtect p,.page-cybersecurity .section-successfulStories p,.page-cybersecurity .section-banner p,.page-cybersecurity .cta-group p,.page-cybersecurity .subscription-form p{font-size:16px}.page-cybersecurity .section-intro .content-container,.page-cybersecurity .section-whyImportant .content-container,.page-cybersecurity .section-commonCyberattacks .content-container,.page-cybersecurity .section-howToProtect .content-container,.page-cybersecurity .section-successfulStories .content-container,.page-cybersecurity .section-banner .content-container,.page-cybersecurity .cta-group .content-container,.page-cybersecurity .subscription-form .content-container{max-width:1200px;margin:0 auto;padding:0 30px;overflow:hidden}.page-cybersecurity .section-intro .content-container h2{margin:10px 0}.page-cybersecurity .section-intro .content-container .areYouAfraid-grp{display:flex}.page-cybersecurity .section-intro .content-container .areYouAfraid-grp .image-container{width:245px;height:250px}.page-cybersecurity .section-intro .content-container .areYouAfraid-grp .image-cybersecurity{background-size:contain;margin:10px 0 20px}.page-cybersecurity .section-intro .content-container .areYouAfraid-grp .questioning-content{margin:0 0 0 20px}.page-cybersecurity .section-intro .content-container .areYouAfraid-grp .questioning-content ul li{margin:10px 0;font-size:16px}.page-cybersecurity .section-intro .content-container .areYouAfraid-grp .questioning-content ul li:first-child,.page-cybersecurity .section-intro .content-container .areYouAfraid-grp .questioning-content ul li:nth-child(6){margin-left:30px}.page-cybersecurity .section-intro .content-container .areYouAfraid-grp .questioning-content ul li:nth-child(2),.page-cybersecurity .section-intro .content-container .areYouAfraid-grp .questioning-content ul li:nth-child(5){margin-left:40px}.page-cybersecurity .section-intro .content-container .areYouAfraid-grp .questioning-content ul li:nth-child(3),.page-cybersecurity .section-intro .content-container .areYouAfraid-grp .questioning-content ul li:nth-child(4){margin-left:50px}.page-cybersecurity .section-intro .content-container h1{font-size:40px}.page-cybersecurity .section-intro .content-container h2,.page-cybersecurity .section-intro .content-container p{font-size:18px}.page-cybersecurity .section-intro .content-container .ciaTriad-grp{position:relative}.page-cybersecurity .section-intro .content-container .ciaTriad-grp .image-ciaTriad{background-size:contain;width:388px;height:300px}.page-cybersecurity .section-intro .content-container .ciaTriad-grp .ciaTriad-content{display:none}.page-cybersecurity .section-intro .content-container .ciaTriad-grp .ciaTriad-content .line-confidentiality,.page-cybersecurity .section-intro .content-container .ciaTriad-grp .ciaTriad-content .line-integrity,.page-cybersecurity .section-intro .content-container .ciaTriad-grp .ciaTriad-content .line-availability{display:block;position:absolute}.page-cybersecurity .section-intro .content-container .ciaTriad-grp .ciaTriad-content .line-confidentiality{top:27px;right:407px}.page-cybersecurity .section-intro .content-container .ciaTriad-grp .ciaTriad-content .line-integrity{bottom:89px;left:398px}.page-cybersecurity .section-intro .content-container .ciaTriad-grp .ciaTriad-content .line-availability{bottom:89px;right:410px}.page-cybersecurity .section-intro .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-confidentiality,.page-cybersecurity .section-intro .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-integrity,.page-cybersecurity .section-intro .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-availability{width:400px;position:absolute}.page-cybersecurity .section-intro .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-confidentiality p,.page-cybersecurity .section-intro .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-integrity p,.page-cybersecurity .section-intro .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-availability p{margin-left:20px}.page-cybersecurity .section-intro .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-confidentiality h3,.page-cybersecurity .section-intro .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-availability h3{margin-bottom:0;margin-left:20px}.page-cybersecurity .section-intro .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-confidentiality h3:before,.page-cybersecurity .section-intro .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-availability h3:before{content:"";background:#2a3795;border-radius:99px;width:6px;height:6px;display:inline-block;position:absolute;top:35%;left:-10px}.page-cybersecurity .section-intro .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-confidentiality p,.page-cybersecurity .section-intro .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-availability p{font-size:14px}.page-cybersecurity .section-intro .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-confidentiality{top:60px;right:17px}.page-cybersecurity .section-intro .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-integrity{bottom:97px;left:9px}.page-cybersecurity .section-intro .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-integrity h3{margin-left:unset;text-align:right;margin-bottom:0;margin-right:20px}.page-cybersecurity .section-intro .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-integrity h3:before{background:0 0}.page-cybersecurity .section-intro .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-integrity h3:after{content:"";background:#2a3795;border-radius:99px;width:6px;height:6px;display:inline-block;position:absolute;top:35%;right:-10px}.page-cybersecurity .section-intro .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-integrity p{text-align:right;margin-right:20px}.page-cybersecurity .section-intro .content-container .ciaTriad-grp .ciaTriad-content .ciaTriad-availability{bottom:99px;right:17px}.page-cybersecurity .section-whyImportant .content-container .stat-container{justify-content:initial;grid-template-columns:repeat(2,minmax(0,1fr));display:grid}.page-cybersecurity .section-whyImportant .content-container .stat-container .stat-content{border:none;flex-direction:column;justify-content:center;align-items:center;width:auto;display:flex}.page-cybersecurity .section-whyImportant .content-container .stat-container .stat-content h4{font-size:14px;height:63px!important}.page-cybersecurity .section-whyImportant .content-container .stat-container .stat-content.stat-content:first-child{border-bottom:none}.page-cybersecurity .section-whyImportant .content-container .stat-container .stat-content.stat-content:last-child{border:none}.page-cybersecurity .section-whyImportant .content-container .stat-container .stat-content.stat-content:nth-child(3) p:before{content:"";background-size:contain;width:9px;height:18px;margin-right:5px}.page-cybersecurity .section-whyImportant .content-container .stat-container p{font-size:48px}.page-cybersecurity .section-whyImportant .content-container .stat-container p span{font-size:14px}}@media screen and (min-width:450px) and (min-width:900px){.page-cybersecurity .section-whyImportant .content-container .stat-container{justify-content:space-around;display:flex}.page-cybersecurity .section-whyImportant .content-container .stat-container .stat-content{width:23%}}@media screen and (min-width:450px){.page-cybersecurity .section-commonCyberattacks{margin:34px 0 50px}.page-cybersecurity .section-commonCyberattacks .content-container .commonCyberattacks-list .commonCyberattacks-container{width:23%;display:block;border:none!important}.page-cybersecurity .section-commonCyberattacks .content-container .commonCyberattacks-list .commonCyberattacks-container p{max-width:unset;text-align:center}.page-cybersecurity .section-commonCyberattacks .content-container .commonCyberattacks-list .commonCyberattacks-container .icon-container{width:50px;height:50px;margin:0 auto 10px}.page-cybersecurity .section-cyber-to-ud .content-container{margin:24px auto;padding:32px 40px}.page-cybersecurity .section-cyber-to-ud .content-container h4{color:#47b549}.page-cybersecurity .section-cyber-to-ud .content-container h4.title{font-size:20px}.page-cybersecurity .section-cyber-to-ud .content-container p{font-size:16px}.page-cybersecurity .section-cyber-to-ud .content-container .ciaTriad-grp .ciaTriad-content{display:none}.page-cybersecurity .section-cyber-to-ud .content-container .walk-our-talk p{margin-bottom:20px;font-size:16px}.page-cybersecurity .section-cyber-to-ud .content-container .walk-our-talk .cve-group{margin-bottom:30px}.page-cybersecurity .section-cyber-to-ud .content-container .walk-our-talk .cve-group .container{width:25%}.page-cybersecurity .section-cyber-to-ud .content-container .walk-our-talk .cve-group p{font-size:14px}.page-cybersecurity .section-cyber-to-ud .content-container .walk-our-talk .awards{text-align:left;margin-bottom:40px;font-size:16px}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore{flex-direction:row;align-items:flex-start;gap:24px;height:auto;min-height:225px;padding:40px 40px 64px;display:flex}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore h4{font-size:15px;line-height:23px}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore p{margin-bottom:20px;font-size:14px;line-height:20px}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .learnmore-t{flex:auto;order:2;line-height:22px}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .learnmore-i{flex:0 0 260px;order:1}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .learnmore-btn{width:130px;height:40px;margin-bottom:16px;display:block}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .graphic-icon{justify-content:center;height:auto;min-height:113px;display:flex;position:relative}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .graphic-icon .graphic-grp{width:192px;height:113px;position:relative;top:auto;right:auto}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .graphic-icon .graphic-grp .mobile{display:none}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .graphic-icon .graphic-grp .desktop{display:block}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .udlogo{background-size:contain;width:32px;height:23px;bottom:20px}.page-cybersecurity .section-cyber-to-ud .content-container .learnmore .udlogo:after{font-size:18px;top:0;left:17px}.page-cybersecurity .section-howToProtect{margin-top:50px;padding-bottom:0}.page-cybersecurity .section-howToProtect .content-container .securityService-list{grid-template-columns:repeat(2,minmax(0,1fr));gap:12px;margin:20px 0 40px;display:grid}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card{flex-direction:column;justify-content:center;align-items:stretch;width:100%;padding:20px;display:flex}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card#incidentResponse{padding:18px}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card h4{text-align:left;margin:0;font-size:16px}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card p{margin:12px 0 0;padding:8px 0 0;font-size:14px}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card .securityService-desc.incidentResponse h4{font-size:18px}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card .securityService-desc.incidentResponse p{font-size:16px}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card#incidentResponse{grid-column:1/-1}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card .icon-container{width:55px;height:55px}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card .securityService-head{justify-content:center;gap:16px}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card .securityService-head .icon-container{flex:0 0 55px;margin:0}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card .icon-pentest{height:52px}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card .icon-regularUpdate{width:40px}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card .icon-phishing{width:50px}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card .icon-SSL{height:46px}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card:hover:nth-child(2) .icon-pentest{width:52px}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card:hover:nth-child(3) .icon-regularUpdate{width:40px}.page-cybersecurity .section-howToProtect .content-container .securityService-list .securityService-card:hover:nth-child(5) .icon-phishing{width:50px}.page-cybersecurity .section-successfulStories{margin-top:34px}.page-cybersecurity .section-successfulStories .content-container .successfulStories-list{grid-template-columns:repeat(3,minmax(0,1fr));gap:12px;margin:20px 0;display:grid}.page-cybersecurity .section-successfulStories .content-container .successfulStories-list .desktop{display:block!important}.page-cybersecurity .section-successfulStories .content-container .successfulStories-list .successfulStories-container{width:100%;margin:0;display:block}.page-cybersecurity .section-successfulStories .content-container .successfulStories-list .successfulStories-container h3{font-size:18px}.page-cybersecurity .section-successfulStories .content-container .successfulStories-list .successfulStories-container p{font-size:14px}.page-cybersecurity .section-successfulStories .content-container .successfulStories-list .successfulStories-container:hover{border:1px solid #47b549}.page-cybersecurity .section-banner{width:100%;max-width:1200px;height:auto;min-height:210px;margin:0 auto 40px}.page-cybersecurity .section-banner .content-container{box-sizing:border-box;min-height:210px;margin:0 30px;padding-right:340px}.page-cybersecurity .section-banner .content-container h4{overflow-wrap:anywhere;max-width:100%;margin:60px 0 0;font-size:20px}.page-cybersecurity .section-banner .content-container .udlogo{background:url(/images/cybersecurity/ud-logo-white.svg) 50%/contain no-repeat;width:33px;height:27px;position:absolute;bottom:28px}.page-cybersecurity .section-banner .content-container .udlogo:after{width:170px;margin-left:38px;font-size:18px;top:3px}.page-cybersecurity .section-banner .content-container .graphic-grp{width:235px;height:139px;position:absolute;top:36px;right:80px}.page-cybersecurity .section-banner .content-container .graphic-grp .desktop{display:block}.page-cybersecurity .section-banner .content-container .graphic-grp .mobile{display:none}.page-cybersecurity .section-banner .content-container .graphic-grp .banner-icon-mssp{background:url(/images/cybersecurity/banner-icon-mssp.svg) 50% no-repeat;width:60px;height:70px;position:absolute;bottom:0;right:40%}.page-cybersecurity .section-banner .content-container .graphic-grp .banner-icon-mssp .banner-icon-cog{background:url(/images/cybersecurity/banner-icon-mssp-cog.svg) 50% no-repeat;width:40px;height:40px;animation:4s linear infinite spin;position:absolute;top:-6px;right:-6px}.page-cybersecurity .section-banner .content-container .graphic-grp .banner-icon-scanning{background:url(/images/cybersecurity/banner-icon-scanning.svg) 50% no-repeat;width:60px;height:60px;position:absolute;bottom:0;left:-16px}.page-cybersecurity .section-banner .content-container .graphic-grp .banner-icon-protect{background:url(/images/cybersecurity/banner-icon-protect.svg) 50% no-repeat;width:34px;height:42px;position:absolute;top:0;left:33px}.page-cybersecurity .section-banner .content-container .graphic-grp .banner-icon-report{background:url(/images/cybersecurity/banner-icon-report.svg) 50% no-repeat;width:35px;height:50px;position:absolute;top:20%;right:13px}.page-cybersecurity .section-banner .content-container .graphic-grp .banner-line-mssp-protect{top:50px;left:50px}.page-cybersecurity .section-banner .content-container .graphic-grp .banner-line-horizontal_1{bottom:21px;left:50px}.page-cybersecurity .section-banner .content-container .graphic-grp .banner-line-horizontal_2{bottom:32px;right:30px}.page-cybersecurity .cta-grp .content-container p{font-size:16px}.page-cybersecurity .subscription-form .content-container p{width:595px;margin:0 auto}.page-cybersecurity .subscription-form .content-container form{width:400px;margin:0 auto}}@media screen and (min-width:1201px){.page-cybersecurity{width:100%}.page-cybersecurity .section-intro .content-container,.page-cybersecurity .section-whyImportant .content-container,.page-cybersecurity .section-commonCyberattacks .content-container,.page-cybersecurity .section-howToProtect .content-container,.page-cybersecurity .section-successfulStories .content-container,.page-cybersecurity .section-banner .content-container,.page-cybersecurity .cta-group .content-container,.page-cybersecurity .subscription-form .content-container{padding:0}}.firewall-page-subnav{width:100%;overflow:hidden}.firewall-page-subnav ul{margin:0;padding:0}.firewall-page-subnav ul li{list-style:none}.firewall-page-subnav .tabContainer{background:#ccc;border-radius:3px;flex-wrap:nowrap;align-items:flex-start;margin:24px 20px 32px;padding:2px;line-height:34px;display:flex}.firewall-page-subnav .tabContainer .tablink{color:#fff;text-align:center;background:#ccc;border-radius:3px;flex:auto;margin:1px;padding:0 8px;font-size:12px;font-weight:700}.firewall-page-subnav .tabContainer .tablink.active{background:#2a3795}@media screen and (min-width:450px){.firewall-page-subnav .tabContainer{width:370px;margin:28px auto 40px}}
