/* Source and licensing information for the line(s) below can be found at https://www.ltts.com/themes/custom/ltts_revamp/css/infographics/cybersecurity-consultancy-info.css. */
.full_table_section{border:5px solid #e6e6e6}.full_table_section .flex_holder{display:flex;flex-wrap:wrap}.full_table_section .flex_holder .table_section{width:25%;position:relative}@media (max-width:991px){.full_table_section .flex_holder .table_section{width:50%}}@media (max-width:620px){.full_table_section .flex_holder .table_section{width:100%}.full_table_section .flex_holder .table_section:after{display:none}}.full_table_section .flex_holder .table_section:after{position:absolute;content:"";width:5px;height:100%;background:#e6e6e6;top:0;right:0;display:block;transition:all .3s ease-in-out}@media (max-width:991px){.full_table_section .flex_holder .table_section:nth-child(2):after{display:none}}.full_table_section .flex_holder .table_section:last-child:after{display:none}.full_table_section .flex_holder .table_section .all_serv{min-height:340px;display:flex;flex-direction:column}.full_table_section .flex_holder .table_section .all_serv .serv{flex:1;border-bottom:3px solid #e6e6e6;display:flex;align-items:center;padding:5px 12px;color:#000;font-size:1rem;font-weight:600;background-color:transparent;transition:all .3s ease-in-out}.full_table_section .flex_holder .table_section .all_serv .serv:hover{background-color:#e6e6e6;color:#112868}.full_table_section .flex_holder .table_section .all_serv .serv:last-child{border-bottom:none}.full_table_section .flex_holder .table_section .all_serv .serv span.cont{position:relative;padding-left:22px}.full_table_section .flex_holder .table_section .all_serv .serv span.cont:after{content:"";width:8px;height:8px;border:none;border-top:2px solid #112868;border-right:2px solid #112868;position:absolute;top:10px;left:0;transform:skew(-20deg,0deg)}.full_table_section .flex_holder .table_section svg path{transition:all .3s ease-in-out}.full_table_section .flex_holder .table_section:hover .table_title{background-color:#23dce1;color:#112868}.full_table_section .flex_holder .table_section:hover svg path{stroke:#112868}.full_table_section .flex_holder .table_section:hover .only-fill-color path{fill:#112868;stroke:#112868}.full_table_section .flex_holder .table_section:hover .only-fill-color .fill-icon{fill:none}.full_table_section .flex_holder .table_section:hover:last-child:after{display:block}.full_table_section .flex_holder .table_section:hover:after{background:transparent linear-gradient(90deg,#084cc8 0,#75c044 50%,#fed314 100%) 0 0 no-repeat padding-box}.full_table_section .table_title{min-height:60px;display:flex;align-items:center;background:#112868;color:#fff;padding:10px 10px 5px;transition:all .3s ease-in-out}.full_table_section .table_title .title-new{font-weight:700;font-size:1.125rem;line-height:22px;margin-left:7px}.full_table_section .table_footer{display:flex;width:100%;justify-content:center;border-top:3px solid #e6e6e6;background-color:transparent;transition:all .3s ease-in-out}.full_table_section .table_footer .table_title{background:0 0;color:#112868;transition:all .3s ease-in-out}.full_table_section .table_footer .table_title .title-new{font-size:1.25rem}.full_table_section .table_footer:hover{background-color:#112868}.full_table_section .table_footer:hover .table_title{color:#fff}.full_table_section .table_footer:hover .table_title svg path{stroke:#fff}
/* Source and licensing information for the above line(s) can be found at https://www.ltts.com/themes/custom/ltts_revamp/css/infographics/cybersecurity-consultancy-info.css. */