Protecting YourPC & Phone

How to Protect Your PC

Bank of Jerusalem recommends installing and regularly updating the following security systems for your PC:

  • Antivirus software
  • Firewall software
  • Anti-spyware software

Important Tips:

If you use file-sharing software, ensure that the personal data stored on your computer is not located in a shared folder. Use the software's admin tool to see which folders on your computer are defined as shared. Remember: all shared folders can be viewed by other users!

Information Security Guidelines for Smartphones

In many ways, a smartphone is just like a tiny laptop, with limited computing abilities but a whole lot of functionality. To keep your smartphone safe from information security threats, it's best to follow these guidelines:

  • Protect your phone by setting up a security code and enabling the automatic screen lock feature.
  • Avoid accessing your bank account via your phone when connected to an unfamiliar or unencrypted Wi-Fi network.
  • Be cautious when opening text messages that contain links, as these may lead to spoof sites or apps, or text messages that ask you for personal information. If you come across these types of messages, or any other message that seems suspicious, do not reply to them or tap the included links.
  • Switch off your phone's GPS if you are not using any apps that require location services.
  • Only accept Bluetooth requests from people you know, and switch off Bluetooth if it’s not needed.
  • Ensure that you only download secure, legitimate apps to your phone by using the authorized app stores: Google Play for Android phones, and the App Store for iOS phones. Never install apps from unfamiliar sources.
  • Always use phones in accordance with the vendor's recommendations. Do not use "jailbroken" phones, or phones that have had their operating systems modified in any way.
  • Install operating system updates on a regular basis – some of these updates include important security features.
  • Install an antivirus app on your phone that will protect the device on an ongoing basis.

Information Security Guidelines for Faxes

Faxes are most commonly used for remote communication, transferring copies of documents between individuals or groups through a telephone line. When sending a fax, one of the best and simplest ways to protect the document from information security threats is to make sure that your intended recipient is next to the fax machine when you send the document. Otherwise, the fax and the information on it may be viewed by other people.

If you use tools to convert faxes to emails and vice versa, bear in mind that the information may be retained by the service providers.

Please note that this website uses Cookies to provide you with a better browsing experience.
For more information see our Privacy Policy