I guess you could do this and really forgo all of the drama. I don't care who they are, this is going to present some major hassles for them and won't cost you too much money;
1) Replace your deadbolts with Bi-Locks.
2) Keep Windows locked, with the opening stops engaged (or use stick/bar)
3) Get a NON-PUMA Chipset Modem. (might I recommend a CM1000, and change the login credentials for it)
4) Get a Gryphon router. (DO NOT activate it yet)
5) Get cheap Tracfone and activate the phone. (burner)
6) Download Gryphon App onto the Tracphone.
7) Get a big bag of Ferrite Ring Core (Ferrite Chokes) on Ebay and put them on all of your cords to your electronics. (especially modem and Gryphon)
Next, this should be done orderly.. First install the new locks on the doors, and secure the windows. Turn off WiFi on all devices. Unplug the ethernet from every device. Disconnect the cable from the cable modem and power it down. Leave the cable disconnected overnight so you bump to a new IP scope.
Plug in the new cable modem (including coax), login to the new modem (192.168.100.1), change the PW to something tough. Now plug in the Gryphon to the modem, install the Gryphon App on the Tracphone. Setup the Gryphon as per the instructions ensuring your WiFi SSID's are good, and the passwords are great.
Now go into each WiFi device and FORGET every network. Disable auto-connect, Hotspot 2.0 and all of that other rubbish on each device, then connect them to the Gryphon SSID. Connect your ethernet cords back to wired devices. But ONLY connect that which MUST have internet. Reduce your threat surface by reducing the devices that really need internet. Once all devices are connected, set the Gryphon to BLOCK ALL NEW DEVICES.
Your Tracphone will serve a few purposes now.. It's your Gryphon Control Device and your Two Factor Authentication device. Enable TFA on every account you have. When you are not using the Tracphone turn off WiFi on it, and toss it into a SCIF/RFID bag. (Signal Blocking Bag they are called on Amazon, etc).
If you still get hacked after this, then we really need to talk.
Basically, most vectors are now closed except for some really powerful adversaries.