Give a copy to each person you frequently share sensitive information with—family, friends, or business partners. Keep networks separate if they don’t overlap.
When you receive a suspicious call or message, hang up and call back using the number saved in your contacts. Both parties scratch the same random circle. If the codes match, you’re likely talking to the right person.For more on keeping your cards organized, see Network Management. If you want to make your own cards, visit the DIY Card Guide. Detailed call steps are in Verify a Caller.