Based on the (lackof) information you have provided... I cannot say for sure.
The best thing to do would be to perform a penetration test... ie, using a program like Nessus, Founstone's Foundscan, or even MBSA if you are using all microsoft. This will check for and attempt to hack in depending on your settings... for instance, Foundscan can do a non-instrusive scan which will just tell you if any cursory vulnerabilities exist... while an instrusive scan will actually attempt a brute force on a vulnerability if it finds one.
If you are using secure coding practices.. this is a good start.
There are many websites that will walk you through the SQL Injection technique... here is one that even shows a variation of your own example:
http://www.securiteam.com/securityreviews/5DP0N1P76E.html
However, you must also remember that SQL Injection is not the ONLY attack that can be run...
I would also suggest a multi-layered approach to your security. If you have the means, I would absolutely suggest hiring a security professional to perform both an internal and an external risk assessment on your business.
I also recommend checking out this website link...10 hacker tricks for exploiting SQL sites ;D
http://searchsqlserver.techtarget.com/tip/1,289483,sid87_gci1165052_tax301336,00.html?bucket=ETA
Good Luck