.avia-section.av-maw28o6v-d7581d621b3c29be34ee781d250377a2 .av-parallax .av-parallax-inner{background-repeat:no-repeat;background-image:url(https://cyberincident.at/wp-content/uploads/2025/03/IT-Security-mit-Strategie-1160x423.jpg);background-position:50% 50%;background-attachment:scroll}.avia-section.av-maw28o6v-d7581d621b3c29be34ee781d250377a2 .av-section-color-overlay{opacity:0.5;background-color:#000000} #top .av-special-heading.av-maw25nvd-016758b437a2c4cfa806e4ba44f74e0b{padding-bottom:10px;color:#ffffff}body .av-special-heading.av-maw25nvd-016758b437a2c4cfa806e4ba44f74e0b .av-special-heading-tag .heading-char{font-size:25px}.av-special-heading.av-maw25nvd-016758b437a2c4cfa806e4ba44f74e0b .special-heading-inner-border{border-color:#ffffff}.av-special-heading.av-maw25nvd-016758b437a2c4cfa806e4ba44f74e0b .av-subheading{font-size:15px;color:#ffffff}body .av-special-heading.av-maw25nvd-016758b437a2c4cfa806e4ba44f74e0b .av-special-heading-tag .heading-wrap:before{border-color:#ffffff}body .av-special-heading.av-maw25nvd-016758b437a2c4cfa806e4ba44f74e0b .av-special-heading-tag .heading-wrap:after{border-color:#ffffff} #top .av-special-heading.av-maw2e295-d301f41700549beef76a18701694896d{padding-bottom:10px}body .av-special-heading.av-maw2e295-d301f41700549beef76a18701694896d .av-special-heading-tag .heading-char{font-size:25px}.av-special-heading.av-maw2e295-d301f41700549beef76a18701694896d .av-subheading{font-size:15px} #top .av-special-heading.av-maw2f4a1-aea956ec3dae6c7cc31fa8a7e73e5565{padding-bottom:10px}body .av-special-heading.av-maw2f4a1-aea956ec3dae6c7cc31fa8a7e73e5565 .av-special-heading-tag .heading-char{font-size:25px}.av-special-heading.av-maw2f4a1-aea956ec3dae6c7cc31fa8a7e73e5565 .av-subheading{font-size:15px}