While trojans and email phishing still feature prominently in hacker toolkits, getting into a system IRL is one of the most effective methods a truly determined hacker can use. Using a USB firewall could be your best defence.