'mostly safe' . . . yes.
However, if someone has cracked it (relatively easy) then they will continue using your bandwidth until you change the key (at which point they crack it again) or the encryption mechanism (at which point they probably just move on to someone elses link).
Looked at objectively, you have pretty much answered your own question. You have unexplained bandwidth usage, you now know it's not print jobs, you believe it's not your own usage, so that pretty much only leaves other people using your bandwidth.
Of course, your estimation of your own usage may be incorrect but it you reckon it is correct then it only leaves external users.
It is quite possible that someone could be using multiple links in your neighbourhood including your own. If someone was a major movie downloader he could easily set up a few cheap machines (or multiple wireless cards in a single machine) and associate with all available networks in the area. There is no 'rule' which says if someone is going to exploit a wireless network that they will only exploit one or even exploit the easiest one.
You could try having a look at the management interface of your wireless router and see how many devices are associated with it. They should be listed either under associations or DHCP leases. You should see one entry for each of your devices *which are turned on* including the print server. If you see more than that total then someone s using your router.
z