You guys just don't understand.
Simply put, NetBIOS on your LAN is great. NetBIOS on your WAN (or across your Internet connection), however, is a security risk of incredible proportions. All sorts of information, such as your domain, workgroup and system names, as well as account information can be obtained via NetBIOS. Thus, it is in your best interests to ensure that it does not leave your network.
If you are using a router as your Internet gateway, you will want to ensure that it does not allow in or outbound traffic via TCP ports 135-139.
If you are using a multi-homed machine (multiple network cards), you should disable NetBIOS on every NIC that is not part of your internal network.
The risk is increased even further when NetBEUI is installed. Because NetBEUI runs independently of TCP/IP, the remote computers don't need to have an IP address in the user's private IP range. As a matter of fact, the remote computer does not need an IP address at all. All that's required is a physical connection to the segment where the user's network is residing. All a potential intruder has to do is browse the network in Network Neighborhood. Because NetBEUI runs independently of TCP/IP, a firewall will not be able to block it.
I for one, prefer to use firewalls (routers) and shared password on all my network shares using NTFS. I guess that one can argue that NetBEUI can add some security, but if someone gest into your LAN through a port, your screwed. This is exactly what they taught me in my college Network security class (Cisco).