Using log files from your firewalls and proxies to track and monitor how much traffic and how many people are using consumer file sharing tools like Dropbox.
Figure 1: Identify at risk users and dangerous sharing activity
You can also ask your finance team to report on how many users are expensing tools that have not been authorized by your IT or Security team.
Figure 2: Sample risk report provided by Skyhigh Networks.
Previous:Executive Summary- Dropbox Problem