@media(max-width: 480px){.cybersecurity-vulnerability-prevention-checklist [class^=btn-]{font-size:16px}}.cybersecurity-vulnerability-prevention-checklist .wrapper{padding-top:0}.cybersecurity-vulnerability-prevention-checklist .main .intro{max-width:100%;overflow:hidden}@media(max-width: 768px){.cybersecurity-vulnerability-prevention-checklist .main .intro{padding-top:96px}}@media(max-width: 640px){.cybersecurity-vulnerability-prevention-checklist .main .intro{padding-top:0}}.cybersecurity-vulnerability-prevention-checklist .main .intro .container{display:flex;flex-flow:row nowrap;justify-content:space-between;align-items:stretch;gap:20px}.cybersecurity-vulnerability-prevention-checklist .main .intro .container:before,.cybersecurity-vulnerability-prevention-checklist .main .intro .container:after{display:none}@media(max-width: 768px){.cybersecurity-vulnerability-prevention-checklist .main .intro .container{flex-flow:column nowrap;align-items:center;justify-content:center}}.cybersecurity-vulnerability-prevention-checklist .main .intro .intro-image{display:flex;flex-flow:row nowrap;justify-content:center;align-items:center;width:50%;max-width:600px;padding:64px 0}@media(max-width: 768px){.cybersecurity-vulnerability-prevention-checklist .main .intro .intro-image{width:100%;height:auto;order:2;padding:0 0 48px}}.cybersecurity-vulnerability-prevention-checklist .main .intro .intro-content{display:flex;flex-flow:column nowrap;justify-content:center;align-items:flex-start;width:50%;max-width:660px;padding:180px 16px}@media(max-width: 1080px){.cybersecurity-vulnerability-prevention-checklist .main .intro .intro-content{width:60%}}@media(max-width: 991px){.cybersecurity-vulnerability-prevention-checklist .main .intro .intro-content{width:70%}}@media(max-width: 768px){.cybersecurity-vulnerability-prevention-checklist .main .intro .intro-content{width:100%;max-width:100%;order:1;padding:48px 16px}}@media(max-width: 640px){.cybersecurity-vulnerability-prevention-checklist .main .intro .intro-content{padding:114px 16px 48px}}@media(max-width: 480px){.cybersecurity-vulnerability-prevention-checklist .main .intro .intro-content{padding:96px 16px 40px}}.cybersecurity-vulnerability-prevention-checklist .main .intro .intro-content h1{color:#fff;width:100%}@media(max-width: 768px){.cybersecurity-vulnerability-prevention-checklist .main .intro .intro-content h1{text-align:center}}@media(max-width: 640px){.cybersecurity-vulnerability-prevention-checklist .main .intro .intro-content h1{text-align:start}}@media(max-width: 480px){.cybersecurity-vulnerability-prevention-checklist .main .intro .intro-content h1{text-align:center}}.cybersecurity-vulnerability-prevention-checklist .main .intro .intro-content p{color:#fff}@media(max-width: 640px){.cybersecurity-vulnerability-prevention-checklist .main .intro .intro-content p{font-size:20px;text-align:start}}@media(max-width: 480px){.cybersecurity-vulnerability-prevention-checklist .main .intro .intro-content p{text-align:center}}.cybersecurity-vulnerability-prevention-checklist .main .intro .intro-content .actions{display:none}.cybersecurity-vulnerability-prevention-checklist .main .intro .intro-content [data-react-component]{width:100%;margin-top:32px}.cybersecurity-vulnerability-prevention-checklist .main .intro .intro-content [data-react-component] .gridRow{gap:0}.cybersecurity-vulnerability-prevention-checklist .main .intro .intro-content [data-react-component] [class^=btn-]{height:48px}@media(max-width: 991px){.cybersecurity-vulnerability-prevention-checklist .main .intro .intro-content [data-react-component] [class^=btn-]{min-width:auto}}@media(max-width: 480px){.cybersecurity-vulnerability-prevention-checklist .main .intro .intro-content [data-react-component] [class^=btn-]{border-radius:24px;width:100%}}@media(max-width: 480px){.cybersecurity-vulnerability-prevention-checklist .main .intro .intro-content [data-react-component] .colMobileHalfMinus,.cybersecurity-vulnerability-prevention-checklist .main .intro .intro-content [data-react-component] .colMobileHalfPlus{width:100%}}.cybersecurity-vulnerability-prevention-checklist .main .intro .intro-content [data-react-component] .terms-notice,.cybersecurity-vulnerability-prevention-checklist .main .intro .intro-content [data-react-component] .terms-notice-checkbox{width:100%;text-align:start}.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways{background:#000;padding:72px 0}@media(max-width: 1440px){.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways{padding:64px 0}}@media(max-width: 1200px){.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways{padding:56px 0}}@media(max-width: 991px){.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways{padding:48px 0}}@media(max-width: 768px){.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways{padding:40px 0}}@media(max-width: 480px){.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways{padding:32px 0}}.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways h2{color:#fff;text-align:center;margin-bottom:24px}@media(max-width: 768px){.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways h2{display:none}}.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways h2+p{color:#fff;text-align:center;max-width:1150px;width:100%;margin:0 auto 68px}@media(max-width: 991px){.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways h2+p{margin-bottom:57px}}@media(max-width: 768px){.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways h2+p{margin-bottom:48px}}@media(max-width: 640px){.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways h2+p{margin-bottom:40px}}@media(max-width: 480px){.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways h2+p{margin-bottom:32px}}.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways h2+p em{font-style:italic;font-weight:500}.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways .theTakeaways{display:flex;flex-flow:row nowrap;justify-content:center;align-items:stretch;gap:56px 10%;width:100%;margin:0 auto;text-align:center}@media(max-width: 1200px){.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways .theTakeaways{gap:56px 48px}}@media(max-width: 991px){.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways .theTakeaways{gap:48px}}@media(max-width: 768px){.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways .theTakeaways{gap:32px;flex-flow:column nowrap;align-items:center}}.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways .theTakeaways span{display:flex;flex-flow:column nowrap;justify-content:space-between;align-items:center;width:33%;text-align:center;padding:120px 0 0;position:relative}@media(max-width: 768px){.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways .theTakeaways span{width:480px;max-width:100%}}.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways .theTakeaways span.unifiedPlatform{background:url("/assets/images/pages/cybersecurity-vulnerability-prevention-checklist/1.svg") no-repeat center top/84px}.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways .theTakeaways span.pamSolution{background:url("/assets/images/pages/cybersecurity-vulnerability-prevention-checklist/2.svg") no-repeat center top/84px}.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways .theTakeaways span.tooComplex{background:url("/assets/images/pages/cybersecurity-vulnerability-prevention-checklist/3.svg") no-repeat center top/84px}.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways .theTakeaways span h3{color:#fff;font-size:20px}.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways .theTakeaways span p.finding{color:#fff;margin-top:32px;border-radius:8px;width:100%}@media(max-width: 768px){.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways .theTakeaways span p.finding{position:relative;margin-top:16px}}.cybersecurity-vulnerability-prevention-checklist .main #fourKeyTakeaways .actions{width:100%;margin:56px 0 0;text-align:center}

/*# sourceMappingURL=index.min.css.map*/