#lc-8f502a34-a7da-4ce3-bd6b-ea5268062d8f{--section-background-color:transparent}#lc-8f502a34-a7da-4ce3-bd6b-ea5268062d8f .lc-section-background{background-image:url(https://www.arkcybersecurityconsultants.com?rm=irgc&hash=06cfcf55&file=root%2FContent%2FBackground-Images%2FACSC_extravagant_screens-2x_2.png&fit=in&w=1920&h=1080&type=webp)}#lc-aee34d8f-f7c3-4b54-bb65-4b481d151dd0{--section-background-color:transparent}#lc-aee34d8f-f7c3-4b54-bb65-4b481d151dd0 .lc-section-background{background-image:url(https://www.arkcybersecurityconsultants.com?rm=irgc&hash=06cfcf55&file=root%2FContent%2FBackground-Images%2FACSC_banner_gray.png&fit=in&w=1920&h=1080&type=webp)}