Well, see, it's like this:
The good news is that NAT is fairly hard to get around from a brute-force perspective. The bad news is that brute force is seldom necessary.
It's much easier to plant a bug / trojan / root kit in a file called something like "Wild Teenage Sex" or some desirable music files or movies, or pictures, or , or , or ... and let some " I wasn't gonna buy it anyway so it's not really stealing" kinda person pimp themselves. It happens thousands of times every day, and virus / trojan / worm / pop-up etc blocking isn't always effective. Once the invading code is on your system, it's owned, and the networked systems are next, or at least available.
Even Intrusion Detection Systems (IDS) have some weaknesses and can be defeated without too much effort. If the administration and monitoring is weak or lazy, the system WILL be compromised. Even in a tight system, it can be an uphill battle against the GD users and folks with portable / laptop systems that can connect outside the corporate security perimeter.
Check the .sig - it's true " There is no patch for human stupidity"
A good security policy is the first, best step to locking down a network. Fill in the hardware blanks, hire a crew to watch everything, and you have a chance.
FWIW
Scott