@font-face{font-family:"Narin Medium";font-display:swap;src:url("https://www.technologyandsecurity.org/wp-content/uploads/et-fonts/narin-medium.otf") format("opentype")}@font-face{font-family:"Narin";font-display:swap;src:url("https://www.technologyandsecurity.org/wp-content/uploads/et-fonts/narin-regular.otf") format("opentype")}@font-face{font-family:"Narin Medium";font-display:swap;src:url("https://www.technologyandsecurity.org/wp-content/uploads/et-fonts/narin-medium.otf") format("opentype")}@font-face{font-family:"Narin";font-display:swap;src:url("https://www.technologyandsecurity.org/wp-content/uploads/et-fonts/narin-regular.otf") format("opentype")}