Information Technology

The City of Liberal Information Technology (IT) Department provides technical assistance to all internal and external departments within the City of Liberal organization. The IT department manages 150+ servers and workstations and currently has on staff 2 full-time employees.

Management Responsibilities Include:
  • Servers (Windows/Unix/IBM)
  • Workstations
  • Printer Support
  • Network equipment (Firewalls/Switches/Wireless Infrastructure)
  • Video Surveillance Systems
  • Web Site Administration
  1. Technology News
  2. Microsoft Security Notifications

Technology News

  1. Goldblum goes gonzo for motorcycles on The World According to Jeff Goldblum - Roadshow

    The Disney Plus series sees him riding baggers in the desert, visiting a bike meet in SoCal and more.

  2. Did the Betty White Challenge help animals? Doggone right it did - CNET

    Fans of the late actress donated to animal charities to mark what would've been her 100th birthday.

  3. The best gel mattresses for 2022 - CNET

    Gel brings a springy, cool feel to traditional foam mattresses. Here are eight of the best gel mattresses you can find this year.

View All

Security Week News

  1. Data of 7 Million OpenSubtitles Users Leaked After Hack Despite Site Paying Ransom

    OpenSubtitles Hack Shows Why Paying Ransom Offers No Guarantees 

  2. Red Cross Appeals to Hackers After Major Cyberattack

    The International Committee of the Red Cross on Thursday made an appeal to hackers who seized a trove of private data, saying they were willing...

  3. NSA Authorized to Issue Binding Operational Directives to Boost NSS Cybersecurity

    Biden signs cybersecurity national security...
		</p>
		</li>









<li class=

    Google Pays Out Over $100,000 for Vulnerabilities Patched With Chrome 97 Update

    Google on Tuesday announced the release of 26 security patches as part of its latest Chrome update, including one for a critical-severity...

  4. Living Off the "Edge" of the Land

    Edge-Access Trojans (EATs) allow attackers to collect data and even disrupt crucial decisions as the edge of the...

View All