Bank of Jerusalem online - Information security

Bank of Jerusalem utilizes state-of-the-art technology and invests every effort to ensure that all its customers can enjoy the full range of online services easily, conveniently, and safely.

When you visit the Bank of Jerusalem website and access your personal account, a padlock icon will appear in the address bar to indicate that your connection with the website is secure:

Green address bar in Internet Explorer:

Address bar in Google Chrome, including a padlock icon
Address bar in Mozilla Firefox:

The green address line indication is only available for secure pages (https://), and is only available in the following browsers:
Internet Explorer 7 or higher
Mozilla Firefox 3 or higher

How do we make sure your account is safe?

  • State-of-the-Art Technology – Bank of Jerusalem leverages advanced technologies to identify and block unauthorized penetration attempts.
  • Data Encryption – All information sent from your PC to the bank's computers, and vice versa, is encrypted to prevent eavesdropping (man-in-the-middle attacks) by unauthorized parties.
  • Advanced Information Security – The bank's database is not directly connected to the internet. Access to data is protected by smart, sophisticated information security systems.
  • Automatic Logoff – After you log into the bank's online banking service, you will be automatically logged off if the system detects that you have been inactive for a period of time. This prevents any unauthorized person from accessing your account.
  • Continuous Security – Bank of Jerusalem's website is continuously monitored by skilled security teams specializing in cyber protection and information security, who identify, locate, and block unauthorized account intrusion attempts in real time, providing a safe, enjoyable online experience.
  • Regular Updates – Information security teams work to continuously improve and update the bank's information security systems, responding to constantly-evolving online threats. 

What's the best way to enjoy a safe, convenient online experience?

  • When accessing the bank’s website, always immediately verify that you are on the correct site. The correct URL for performing transactions in your personal account is:
  • It's important to check several key details when you access the site to ensure it is secure and that you have accessed the legitimate Bank of Jerusalem website rather than an imposter website. These imposter sites will look like the regular Bank of Jerusalem site, but the URL displayed in the address bar will be different, and may not contain the "https" prefix, which indicates secure communication.
    • Make sure that the URL in your address bar begins with the characters https, indicating secure, encrypted communication. The URL should look like this:
    • After you log into the service page, immediately check that a closed padlock icon is displayed in the address bar.
    • Double-click the padlock icon to open a digital certificate, confirming that the current website does indeed belong to Bank of Jerusalem.
  • In order to ensure that you are always using the official Bank of Jerusalem website rather than an imposter site, avoid accessing the website via links or emails from an unfamiliar source.
  • For your convenience, the Bank of Jerusalem website always displays the date and time of your last visit. This enables you to verify this information and check that no one has accessed your account without your knowledge.
  • Finished using the wide range of services offered on the Bank of Jerusalem site? Make sure you always log off from the service by clicking the "Exit" button, located above the toolbar at the top of the page.

Protecting your PC

Bank of Jerusalem recommends installing and regularly updating the following security systems:

  1. Antivirus software
  2. Firewall software
  3. Anti-spyware software

Important Tips:

If you use file-sharing software, ensure that the personal data stored on your computer is not located in a shared folder. Use the software's admin tool to see which folders on your computer are defined as shared. Bear in mind that all shared folders can be viewed by other users.

Information Security Guidelines for Smartphones

In many ways, a smartphone is just like a tiny laptop, with limited computing abilities but a whole lot of functionality. To keep your smartphone safe from information security threats, it's best to follow these guidelines:

  • Protect your phone by setting up a security code and enabling the automatic screen lock feature.
  • It is recommended to avoid accessing your bank account via your phone when connected to an unfamiliar or unencrypted Wi-Fi network.
  • Be cautious when opening text messages, as they may contain links that lead to imposter sites or apps, or request that you send out personal details. If you come across these types of messages, or any other message that seems suspicious, do not reply to them or tap the included links.
  • It is recommended to switch off your phone's GPS when not using an app that requires location services.
  • Only accept Bluetooth requests from people you know and switch off this function when it is not required.
  • Use only authorized app stores to ensure that you download secure, legitimate apps to your phone: Google Play for Android phones, and the App Store for iOS phones. Avoid installing apps from unfamiliar sources.
  • Use phones in accordance with the vendor's recommendations. Do not use "jailbroken" phones, or phones that have had their operating systems modified in any way.
  • It is recommended to install operating system updates on a regular basis – some of these updates include important security features.
  • Be sure to install an antivirus app on your phone.

Information Security Guidelines for Faxes

Faxes are most commonly used for remote communication, transfering copies of documents between individuals or groups through a telephone line. One of the best and simplest ways to protect these documents from information security threats is to make sure that the intended recipient of the fax is near the device when you send it. Otherwise, the fax and the information on it may be viewed by other people. Please note that when you use tools to convert faxes to emails and vice versa, the information being transmitted may be retained by the service providers.

Saving & Updating your password   

Please note that Bank of Jerusalem representatives will never ask you to reveal your password in any way or under any circumstances, and you should not disclose your password to any other party. If you have been asked to provide your password by any other party, do not reveal it, and report the request immediately to the customer service center at *5727.

  • When you complete your registration for Bank of Jerusalem's online banking service, you will be assigned a temporary personal password. Please log into the Bank of Jerusalem website within 30 days and change this temporary password to a new one that is known only to you.
  • If you do not log into the online banking service within 30 days of receiving your password, this password will be blocked automatically. To recover a blocked password, use the "Password Recovery" service on the website, or contact the technical support center at +972-76-8096666.
  • Bank of Jerusalem recommends choosing a special, complex password that another person would find hard to guess. Your password must consist of at least six characters, including at least two English letters and two numbers.
  • Your new password should not contain any personal information that may be familiar to other people, such as your first name or surname, birthday, ID number, bank account number, or any simple numerical sequence.
  • If you enter the wrong password five times in a row, your access to the service will be blocked. In order to restore your access to the site, you will need recover your password via the website or the technical support center.
  • Do not write down your password on slips or documents that can be easily seen or found by others. It is also recommended to avoid writing your password in files on your computer or smartphone.
  • For optimal security, take care to change your password every 180 days.
  • It is recommended to avoid using any browser that automatically stores your passwords.
  • Do not reveal your password to anyone – not even your spouse, friends, or family. Even if a person claiming to be a "Bank of Jerusalem representative" asks you for your password by email or phone, do not disclose your password under any circumstances.
  • Never send any confidential account information by email, such as your account number, username, password, or credit card number.
  • When accessing your bank account from a public place, ensure that the screen is not visible to other people.
  •  In any case of suspected unauthorized use of your account - inform the bank immediately in any way that is convenient to you:
    1.      Call a Bank of Jerusalem representative on *5727.
    2.      Call the Technical Support Help Desk on 076-809666     


Phishing is an attempt by malicious parties to exploit human weaknesses in order to obtain sensitive personal information (such as a username and password, personal details, credit card numbers, etc.) by sending messages that impersonate a legitimate party. Phishing can be conducted by email, text message, and messaging apps like WhatsApp, and these attacks can include links to an imposter site similar to the genuine Bank of Jerusalem website.

How can I identify a phishing attempt?

The malicious message will urge you to respond immediately or click a link that will take you to an imposter site that resembles the Bank of Jerusalem website.

A few tips to help you identify a phishing message:

  1. From: The sender's email address will be unknown or suspicious.
  2. To: The message will normally have been sent to a whole list of recipients who are not familiar to you.
  3. Subject: The subject line does not match the message contents, or includes "re:" or "fwd:" as if responding to a message you never sent.
  4. Date: Phishing messages are often sent at unusual times – such as late at night, on weekends, or during public holidays.
  5. Links: Links that go to different websites than the ones displayed in the links, misspelled URLs, messages that contain only links and no other information.

Please note that Bank of Jerusalem representatives will never ask you to reveal your password in any way, and you should not disclose your password to any other party. If you have been asked to provide your password by any other party, please refuse and report the request immediately to the Bank of Jerusalem customer service center at *5727.

How do I protect myself from phishing?

  • Never send any personal information by email, such as your ID number, bank account number, credit card number, or Bank of Jerusalem username and password.
  • If an email looks suspicious, delete it immediately, without opening it.
  • Bank of Jerusalem will send occasional emails and text messages to its customers. However, we never ask you to reply with personal information, such as your username or password.
  • Do not enter your email address and password on any unfamiliar website.
  • Be wary of any “tempting” benefits that are sent to your personal email account.

If you respond to a suspicious message that may be a phishing attempt:

  • First of all, notify Bank of Jerusalem immediately by dialing *5727.
  • If you have entered any personal information on an imposter site (such as your ID number, bank account number, or Bank of Jerusalem username and password), you will need to change your password immediately and notify the bank's service center.
  • If you have entered any credit card details on an imposter site, contact your credit card company or the bank's service center immediately to receive further guidance.

What Is SIM Hijacking?

Also known as SIM swapping, SIM hijacking is an attack where hackers manage to steal your mobile phone number in one of two ways: 

  1. Moving your number to the attacker’s phone.
  2. Asking your mobile carrier to replace your current SIM with the attacker’s new SIM (through identity theft).

Every mobile carrier has a service that enables them to port a telephone number currently associated with one SIM card to a different device with a different SIM card. This is designed to let you keep the same phone number in the event that your phone is stolen or you decide to switch carriers.

During these attacks, the hackers impersonate you using basic personal details they have managed to gather. They then ask a representative at the mobile carrier to port your number to an alternative SIM card in the hackers’ possession. This phone number, plus your ID number and other basic details, are sufficient to gain access to your bank account, where they can then easily change your password and start making transfers.

Protect Yourself Against SIM Hijacking:

  1. If you are not able to activate your mobile network for a period of time, it is recommended to contact the mobile carrier and ensure that your number has not been transferred. It is important to update the bank in the event of any issue.
  2. If your phone number changes, make sure that you notify the bank so that the updated number appears in all systems.
  3. It is recommended to register to receive alerts when performing bank account transactions in a text messages and keep an eye out for account activity.
  4. If you receive unexpected or uninitiated text messages and emails requesting personal or financial information, treat them with suspicion, even if they were allegedly sent by the bank.
  5. Avoid posting personal details (such as your phone number, date of birth, elementary school, pet’s name, etc.) on social media, as malicious agents may use them to answer security questions common in many applications.
  6. It is recommended to check with your mobile carrier if there are any additional security measures that can be implemented to prevent your number being ported without your approval.
  7. If your phone is stolen, it is recommended to ask your mobile carrier to block the number as soon as possible, and also notify the bank about the incident.


Customer Activity Records in the Bank's Computer Systems

Please note that Bank of Jerusalem records all customer transactions and instructions, including their content and date.

In the event that you suspect unauthorized use of your account, or in the event of suspected identity theft, loss or theft of a cellphone, misuse of a cellphone, or a change in your telephone number, you must notify the bank immediately via the most convenient channel:

  1. Contact a Bank of Jerusalem Representative – *5727
  2. Contact the Technical Support Center – +972-76-8096666


Fill in the details and a banker will contact you

*Your details will be saved so that the banker can contact you.

Please note that this website uses Cookies to provide you with a better browsing experience.
For more information see our Privacy Policy