Merchant Card Services provide companies the ability to process credit and debit cards at the point of sale, in a restaurant, through mail order or telephone order, internet, or mobile. Pricing options available:
Optional services include:
Other features and benefits include:
Simplify your business operations with Clover:
Clover can help you:
© 2022 Clover Network, LLC. The Clover name, logo and related trademarks are owned by Clover Network, LLC and are registered or used in the U.S. and many foreign countries. Merchant services are provided by are provided by Clover affiliate First Data Merchant Services LLC. All trademarks, service marks and trade names referenced in this material are the property of their respective owners. Bank Safely with JSSB In a world of hacking, phishing, fraud, and ransomware, JSSB stands as your partner for financial security with online and in-person transactions. JSSB fortifies your online banking with a technology called Secure Socket Layer (SSL) encryption. This is spotted when you see "https" rather than "http" at the beginning of our web address. You may also notice the address bar is green. This means the site is secure and encrypted. Here's How You Can Help:
And, we want to help you be safe everywhere online, not just when using the JSSB website. Here are some additional tips to help keep your information and accounts secure:
What is Peer-to-Peer (P2P) Payment Fraud? Consumers often fall victim to P2P payment fraud when they send funds to the wrong person, often the perpetrator of the attack, who does not hold up his/her end of the transaction. This is due to the fact that the perpetrator is often running a scam. Another, more rapidly growing, attack style of P2P payment fraud is in the form of an account takeover. An account takeover happens when a user’s credentials are acquired by the fraudster and then used, impersonating the victim, to conduct transactions from the bank account or application. How to Prevent P2P Payment Fraud: 1. Activate two-factor authentication with P2P payment applications. 2. Monitor accounts and set up alerting. Consumers will want to monitor items such as: Dormant accounts suddenly moving cash in and out, unusually high dollar amounts sent, new user/contacts added and change in contact method (phone number, email address, physical address, etc.). 3. Use smart mobile phone practices: Create a strong lock screen password that is hard to guess, avoid connecting to public/open Wi-Fi and keeping all application up-to-date. IC3 - Internet Crime Compliant Center |