News

ITWeb
itweb.co.za > article > sa-to-see-fintech-led-mvnos-offering-crypto-services > 5yONP7ErZPLMXWrb

SA to see fintech-led MVNOs offering crypto services

1+ week, 5+ day ago  (513+ words) South Africa's mobile virtual network operator (MVNO) sector is undergoing a structural shift, with 2026 expected to see deeper convergence of telecoms and financial services, as fintech-led operators move to offer telecoms-as-a-service. This is according to "BMI's technology key themes for…...

ITWeb
itweb.co.za > article > is-your-business-paying-too-much-for-e-mail-in-2026 > KBpdg7pmgGLMLEew

Is your business paying too much for e-mail in 2026?

1+ mon, 1+ week ago  (624+ words) When entrepreneurs think about getting online, building a website is usually the first step. And yes " that matters. But one of the smartest first moves is often much simpler: a professional e-mail address that matches your domain. In 2026, there's a…...

ITWeb
itweb.co.za > article > founders-your-first-pitch-starts-with-professional-e-mail > DZQ58MV8DEQvzXy2

Founders, your first pitch starts with professional e-mail

4+ mon, 1+ week ago  (230+ words) Built for founders, not just IT professionals, HMailPlus by HOSTAFRICA goes beyond the basics with business-grade tools that are easy to understand and even easier to use: Best of all, you don't need a technical background or a big budget…...

ITWeb
itweb.co.za > article > when-e-mail-is-the-battlefield-why-built-in-defences-no-longer-cut-it > xnklOvz1OgPq4Ymz

When e-mail is the battlefield: Why built-in defences no longer cut it

4+ mon, 2+ week ago  (619+ words) South Africa has earned an unenviable title: one of the world's top targets for phishing. In fact, local organisations face nearly twice the global average of phishing attacks each year. Combined with a rise in AI-generated scams and zero-day exploits,…...

ITWeb
itweb.co.za > article > attend-webinar-on-how-to-profit-from-smart-e-mail-management > 4r1ly7R9LD5vpmda

Attend webinar on how to profit from smart e-mail management

4+ mon, 4+ week ago  (192+ words) When it comes to IT services, the ability to add measurable value to customers is paramount. Fortunately, service providers can differentiate themselves by using a smart e-mail solution. This is what will be revealed during an exclusive online webinar on…...

ITWeb
itweb.co.za > article > what-does-your-e-mail-say-about-your-business > KzQenqjyzjgMZd2r

What does your e-mail say about your business?

5+ mon, 1+ week ago  (350+ words) When you meet a potential client or partner for the first time, you wouldn't arrive in a wrinkled t-shirt and worn-out sneakers " you'd put on a smart suit to look professional and make the right impression. Online, your e-mail address…...

ITWeb
itweb.co.za > article > white-paper-the-hidden-risks-of-unmanaged-e-mail-signatures-why-enterprise-leaders-must-take-control > j5alrMQAOmOMpYQk

White paper: The hidden risks of unmanaged e-mail signatures: Why enterprise leaders must take control

7+ mon, 1+ week ago  (151+ words) Unmanaged e-mail signatures create hidden liabilities. - White paper: The hidden risks of unmanaged e-mail signatures: Why enterprise leaders must take control E-mail signatures are often treated as a low-level concern. However, in large organisations, they represent a significant risk that…...

ITWeb
itweb.co.za > article > sa-developer-bridges-digital-divide-through-e-mail-based-ai-tool > PmxVE7KEKy4qQY85

SA developer bridges digital divide through e-mail-based AI tool

7+ mon, 3+ week ago  (611+ words) Jeeten Bhoora has launched Siza AI, an e-mail based AI platform designed to answer questions and assist with learning directly through e-mail. Bhoora says the platform offers a way for users in underserved and rural communities to interact with AI…...

ITWeb
itweb.co.za > article > how-to-spot-phishing-vishing-smishing > j5alrvQAboJvpYQk

How to spot phishing, vishing, smishing

9+ mon, 1+ week ago  (254+ words) According to Gartner, phishing remains a top cyber security threat, with attackers employing multiple channels " including e-mail, text messages, voice calls and QR codes " to gather information and compromise systems. The sophistication of these attacks has increased, making them harder…...