While trojans and email phishing still feature prominently in hacker toolkits, getting into a system IRL is one of the most effective methods a truly determined hacker can use. Using a USB firewall could be your best defense.
http://gizmodo.com/for-true-cyber-security-using-a-usb-firewall-is-essent-1792986118…