#lc-5ff108a6-9b6d-47ab-ac8a-1780dd93a4f2{--section-background-color:transparent}#lc-5ff108a6-9b6d-47ab-ac8a-1780dd93a4f2 .lc-section-background{background-image:url(https://www.arkcybersecurityconsultants.com?rm=irgc&hash=06cfcf55&file=root%2FContent%2FBackground-Images%2FACSC_banner_gray.png&fit=in&w=1920&h=1080&type=webp)}#lc-3ea10891-d1de-4396-8308-8b8425e93ab1{--section-background-color:transparent}#lc-3ea10891-d1de-4396-8308-8b8425e93ab1 .lc-section-background{background-image:url(https://www.arkcybersecurityconsultants.com?rm=irgc&hash=06cfcf55&file=root%2FContent%2FBackground-Images%2FACSC_banner_gray.png&fit=in&w=1920&h=1080&type=webp)}