Information Security & Internet Safety

Effective cybersecurity is a top priority for the Bank of Jerusalem, as we make every effort to ensure that all our customers can enjoy our full range of online services with maximum convenience and peace of mind. We are committed to always using the best, most advanced security measures to protect your financial and personal data, in line with all regulatory requirements.

When you access your personal account via the Bank of Jerusalem website, a padlock icon will appear in the address bar to indicate that your connection with the website is secure. This will look slightly different, depending on which browser you are using.

Green address bar in Internet Explorer:
Address bar in Google Chrome, including a padlock icon
Address bar in Mozilla Firefox:
Address bar in Microsoft Edge:

Please note that the green address bar will only appear when viewing secure pages (https://) in certain browsers:
Internet Explorer 7 or higher
Mozilla Firefox 3 or higher

How do we make sure your account is safe?

Leading-Edge Security Technology – Bank of Jerusalem leverages internationally recognized advanced technologies to identify and block unauthorized penetration attempts.

Data Encryption – All data sent from your PC to the bank's computers, and vice versa, is encrypted to prevent eavesdropping (man-in-the-middle attacks) by unauthorized parties.

Advanced Information Security – The bank's database is protected by the latest smart cybersecurity systems. It is not directly connected to the internet, protecting access to your data.

Automatic Logoff – After you log into the bank's online banking service, you will be automatically logged off if the system detects that you have been inactive for a period of time. This prevents your account from being accessed by an unauthorized person.

Continuous Security – Bank of Jerusalem's website is continuously monitored by skilled security teams specializing in cyber protection and information security, who identify, locate, and block unauthorized account intrusion attempts in real time, providing a safe, enjoyable online experience.

Regular Updates – Our information security teams are always working to improve and update the bank's information security systems, responding to constantly-evolving online threats. 

What's the best, most convenient way to stay safe online?

  • When visiting the Bank of Jerusalem website, always check that you are on the correct site before performing any transactions in your personal account. The correct URL is:
  • It's important to check several key details when you visit the site to ensure it is secure and that you are on the real, legitimate Bank of Jerusalem website rather than a spoof or imposter website. These spoof sites will look like the regular Bank of Jerusalem site, but the URL displayed in the address bar will be different, and may not contain the "https" prefix, which indicates secure communication.
  • Make sure that the URL in your address bar begins with the characters https, indicating secure, encrypted communication. The URL should look like this:
  • After you log into the service page, immediately check that a closed padlock icon is displayed in the address bar.
  • Double-click the padlock icon to open a digital certificate, confirming that the current website does indeed belong to Bank of Jerusalem.
  • In order to ensure that you are always using the official Bank of Jerusalem website rather than a spoof site, avoid accessing the website via links or emails from an unfamiliar source.
  • For your convenience, the Bank of Jerusalem website always displays the date and time of your last visit. This means that you can check whether anyone has accessed your account without your knowledge.
  • Finished using the wide range of services offered on the Bank of Jerusalem site? Make sure you always log off from the service by clicking the "Exit" button, located above the toolbar at the top of the page.

Protecting your PC

Bank of Jerusalem recommends installing and regularly updating the following security systems:
1. Antivirus software
2. Firewall software
3. Anti-spyware software

Important Tips:

If you use file-sharing software, ensure that the personal data stored on your computer is not located in a shared folder. Use the software's admin tool to see which folders on your computer are defined as shared. Remember: all shared folders can be viewed by other users!

Information Security Guidelines for Smartphones

In many ways, a smartphone is just like a tiny laptop, with limited computing abilities but a whole lot of functionality. To keep your smartphone safe from information security threats, it's best to follow these guidelines:

  • Protect your phone by setting up a security code and enabling the automatic screen lock feature.
  • Avoid accessing your bank account via your phone when connected to an unfamiliar or unencrypted Wi-Fi network.
  • Be cautious when opening text messages, as they may contain links that lead to spoof sites or apps, or ask you for personal information. If you come across these types of messages, or any other message that seems suspicious, do not reply to them or tap the included links.
  • Switch off your phone's GPS if you are not using any apps that require location services.
  • Only accept Bluetooth requests from people you know, and switch off Bluetooth if it’s not needed.
  • Only use authorized app stores to ensure that you download secure, legitimate apps to your phone: Google Play for Android phones, and the App Store for iOS phones. Never install apps from unfamiliar sources.
  • Always use phones in accordance with the vendor's recommendations. Do not use "jailbroken" phones, or phones that have had their operating systems modified in any way.
  • Install operating system updates on a regular basis – some of these updates include important security features.
  • Install an antivirus app on your phone.

Information Security Guidelines for Faxes

Faxes are most commonly used for remote communication, transferring copies of documents between individuals or groups through a telephone line.

When sending a fax, one of the best and simplest ways to protect the document from information security threats is to make sure that your intended recipient is next to the fax machine when you send the document. Otherwise, the fax and the information on it may be viewed by other people.

If you use tools to convert faxes to emails and vice versa, bear in mind that the information may be retained by the service providers.

Saving & Updating your password   

Always remember that Bank of Jerusalem representatives will never ask you to reveal your password in any way or under any circumstances, and you should not disclose your password to any other party. If you have been asked to provide your password by any other party, do not reveal it, and report the request immediately to the customer service center at *5727.

  • When you complete your registration for Bank of Jerusalem's online banking service, you will be assigned a temporary personal password. Please log into the Bank of Jerusalem website within 30 days and change this temporary password to a new one that is known only to you.
  • If you do not log into the online banking service within 30 days, this password will be blocked automatically. To recover a blocked password, use the "Password Recovery" service on the website, or contact the technical support center at +972-76-8096666.
  • Bank of Jerusalem recommends choosing a unique, complex password that another person would find hard to guess. Your password must consist of at least six characters, including at least two English letters and two numbers.
  • Your new password should not contain any personal information that may be known by other people, such as your first name or surname, birthday, ID number, bank account number, or any simple numerical sequence (like 12345).
  • If you enter the wrong password five times in a row, your access to the service will be blocked. In order to restore your access to the site, you will need to recover your password via the website or the technical support center.
  • Do not write down your password anywhere that it can be easily seen or found by others, like on slips of paper or documents. It is also recommended to avoid writing your password in files on your computer or smartphone.
  • For optimal security, it’s best to change your password every 180 days.
  • Avoid using any browser that automatically stores your passwords.
  • Do not reveal your password to anyone – not even your spouse, friends, or family. Even if a person claiming to be a "Bank of Jerusalem representative" asks you for your password by email or phone, do not disclose your password under any circumstances.
  • Never send any confidential account information by email. This includes your account number, username, password, and credit card number.
  • When accessing your bank account from a public place, ensure that the screen cannot be seen by other people.
  • If you suspect unauthorized use of your account – inform the bank immediately in either of the following ways:
  1. Call a Bank of Jerusalem representative on *5727.
  2. Call the Technical Support Help Desk on 076-809666 


Phishing is an attempt by malicious parties to exploit human weaknesses in order to obtain sensitive personal information (like your username and password, personal details, credit card numbers, etc.) by sending messages that claim to be from a credible person or institution you know.

Phishing can be conducted by email, text message, and messaging apps like WhatsApp, and these attacks can include links to a spoof site similar to the genuine Bank of Jerusalem website.

How can I identify a phishing attempt?

The malicious message will ask you to respond immediately or tell you to click a link that will take you to a spoof site that looks like the real Bank of Jerusalem site.

A few tips to help you identify a phishing message:

  1. From: The sender's email address will be unknown or suspicious in some other way.
  2. To:The message will normally have been sent to a whole list of recipients who are not familiar to you.
  3. Subject: The subject line does not match the message contents, or includes "re:" or "fwd:" as if responding to a message you never sent.
  4. Date: Phishing messages are often sent at unusual times – such as late at night, on weekends, or during public holidays.
  5. Links: Links that go to different websites than the ones displayed in the links; misspelled URLs; messages that contain only links and no other information.

Always remember that Bank of Jerusalem representatives will never ask you to reveal your password in any way, and you should not disclose your password to anyone. If anyone asks you to provide your password, please refuse and report the request immediately to the Bank of Jerusalem customer service center at *5727.

How do I protect myself from phishing?

  • Never send any personal information by email, such as your ID number, bank account number, credit card number, or Bank of Jerusalem username and password.
  • If an email looks suspicious, delete it immediately, without opening it.
  • Bank of Jerusalem will send occasional emails and text messages to its customers. However, we never ask you to reply with personal information, like your username or password.
  • Do not enter your email address and password on any unfamiliar website.
  • Be wary of any “tempting” or too-good-to-be-true benefits that are sent to your personal email account.

If you respond to a suspicious message that may be a phishing attempt:

  • First of all, notify Bank of Jerusalem immediately by dialing *5727.
  • If you have entered any personal information on a spoof site (like your ID number, bank account number, or Bank of Jerusalem username and password), change your password immediately and notify the bank's service center.
  • If you have entered any credit card details on a spoof site, contact your credit card company or the bank's service center immediately to receive further guidance.

What Is SIM Hijacking?

Also known as SIM swapping, SIM hijacking is an attack where hackers manage to steal your mobile phone number in one of two ways: 

  1. Moving your number to the attacker’s phone.
  2. Asking your mobile carrier to replace your current SIM with the attacker’s new SIM (through identity theft).

Every mobile carrier has a service that enables them to port a telephone number currently associated with one SIM card to a different device with a different SIM card. This is designed to let you keep the same phone number in the event that your phone is stolen or you decide to switch carriers.
During these attacks, the hackers impersonate you using basic personal details they have managed to gather from various sources. They then ask a representative at the mobile carrier to port your number to an alternative SIM card in the hackers’ possession. This phone number, plus your ID number and other basic details, are sufficient to gain access to your bank account, where they can then easily change your password and start making transfers.

Protect Yourself Against SIM Hijacking:

  1. If you are not able to activate your mobile network for a period of time, it is recommended to contact the mobile carrier and ensure that your number has not been transferred. It is important to update the bank in the event of any issue.
  2. If your phone number changes, make sure that you notify the bank so that the new, updated number appears in all systems.
  3. Register to receive text message alerts that will notify you of all bank account transactions, and keep an eye out for unusual account activity.
  4. If you receive unexpected or uninitiated text messages and emails requesting personal or financial information, treat them with suspicion, even if they were allegedly sent by the bank.
  5. Avoid posting personal details (like your phone number, date of birth, elementary school, pet’s name, etc.) on social media, as malicious agents may use them to answer security questions common in many applications.
  6. It is recommended to check with your mobile carrier if there are any additional security measures that can be implemented to prevent your number being ported without your approval.
  7. If your phone is stolen, it is recommended to ask your mobile carrier to block the number as soon as possible, and also notify the bank about the incident.

Customer Activity Records in the Bank's Computer Systems

Bank of Jerusalem records all customer transactions and instructions, including their content and date.

If you suspect unauthorized use of your account or, in the event of suspected identity theft, loss or theft of a cellphone, misuse of a cellphone, or a change in your telephone number, notify the bank immediately in one of the following ways:

  1. Contact a Bank of Jerusalem Representative – *5727
  2. Contact the Technical Support Center – +972-76-8096666




Fill in the details and a banker will contact you

*Your details will be saved so that the banker can contact you.

Please note that this website uses Cookies to provide you with a better browsing experience.
For more information see our Privacy Policy