Protecting your Clover POS system from fraud and data breaches requires proactive security practices. This guide covers the most important steps to secure your account, devices, and customer payment data.
Step-by-Step Instructions
- Use strong, unique passwords for your Clover dashboard account. Enable two-factor authentication if supported by your processor.
- Never share Admin credentials with employees. Create individual employee accounts with appropriate permission levels.
- Regularly review employee permission settings. Remove access immediately when an employee leaves the company.
- Keep all Clover software and apps updated. Updates contain critical security patches.
- Inspect your card readers regularly for physical tampering or skimming devices. A legitimate Clover reader will not have any additional attachments or loose parts.
- Train staff to recognize social engineering attempts: fraudulent calls claiming to be from Clover or your bank asking for credentials or remote access.
- Monitor your Transactions report daily for any unauthorized or unusual transactions. Report suspicious activity to your processor immediately.
📌 Important Note: PCI DSS compliance requires merchants to never store full card numbers, CVV codes, or PINs anywhere outside the Clover system. Clover is PCI compliant when used as intended.
Frequently Asked Questions
Change your password immediately, review all recent transactions, revoke suspicious employee accounts, and contact your processor's fraud department without delay.
Clover's official card readers use encrypted hardware that is extremely difficult to clone. The risk is from external skimming devices being physically attached — inspect devices regularly.
PCI DSS is a set of security requirements for all merchants who accept card payments. Clover helps you maintain compliance, but you must complete your processor's annual PCI compliance questionnaire.
Still having trouble?
Our Clover experts resolve most issues in under 15 minutes — available 24/7.
Contact KloverSupport →