I used to teach this stuff for the Dept. of Defense. You have obviously been less than fully vigilant in your mal-ware protection.
Any .EXE file can be infected with any virus that affects .EXE files. Older versions of Access have old versions of the MDAC API, which is also highly susceptible. In fact, in the last decade, MDAC has been in the SANS Institute top 20 applications vulnerabilities list. (Windows itself has been on the top 20 O/S vulnerabilities list. Makes you think, doesn't it?) Your .DLL files are just as vulnerable as the .EXE files. Macro viruses have long been known that can attack any Office product with VBA abilities - which, these days, is most of them.
However, there is good news. For money and a little bit of dedicated time, you can attack this problem to head it off.
If your sub-net has a proxy server or other common entry point that is your interface to the Internet, you can put a good firewall there. If you have a local mail server, put a good content-checking anti-virus there. Look up the topic of Intrusion Detection systems on the web, you'll get lots of good hits from commercially available products. I have had very good results from many different products.
For small sub-nets, I recommend either the Defender (Kapersky Labs) or McAfee packages. For larger sub-nets, McAfee and Symantec have good track records. Zone Alarm and Black Ice also have decent reputations. For mail server checking, McAfee and Guinevire (spelling?) are good. Each has strengths and weaknesses, so read up on whatever you are considering. You want a firewall with a simple interface, you want anti-virus and anti-spyware that is signature based, and if possible, you want the latter two packages to be configurable for auto-update and auto-scan. An anti-virus package with heuristic behavior checking would be good, too.
Now the soul-searching issue. In the last decade, the seven biggest cases of "gotcha" were attacks on known vulnerabilities that could have been closed by patching beforehand. Ever hear of NIMDA or Code Red? What about Michaelangelo? Or things in the category of the "Morris worm"...?
Patching is a pain in the patootie. But flushing your system to reload the software from the ground up and HOPE you can recover your data and HOPE you remembered to load all the layered products and HOPE you can get your sub-net back into operation before your revenue tanks... that is far worse. Patching on a regular basis and keeping up anti-intrusion software (firewall, anti-virus, anti-spyware) are the sine qua non of a healthy computer sub-net. The hackers don't sleep. They don't give up. And that means neither can you. But with a good mix of commercially available security software, you can reclaim at least some hours of sleep per week that would otherwise be lost due to recovery activities at inconvenient hours (are there any other kind in this business?).