...
What we have now served it's purpose but the number of ways an attacker can come at you is staggering & of a threat actor really wants to target someone and can put in the time.. they will succeed. It requires significant skill but that's what happens when a complex system isn't designed to be secure. Doesn't help that we keep putting band-aids on the wounds and adding functionality on top of the proverbial screen door on a submarine.
Ok, but to be fair, you're talking about internet 1.0
era technologies as well, such as email. Email alone is the initial cause for 70-90% of data breaches, so a "secure" "email 2.0" would be huge in itself. It's also a herculean effort already to replace email as it exits today, which is why it also continues to receive bolt-ons like DKIM, DMARC, ARC Sealing, DNS DANE, and so on. There's a reason for that though: sometimes things just need evolution, not a revolution.
Much of the world's population grew up during that era or even prior -- it's really about minds and awareness. Social engineering isn't close to being beaten and if anything is only swinging in attackers' favors as you see those kids in the U.K. and elsewhere hacking Microsoft, nVidia, and more recently huge grocery chains, airlines, etc. (look up "Lapsus$" and "Scattered Spider") using simple IT help desk tricks.
Anyways, modern [black hat] hacking doesn't require significant skill as there's more and more open source and low cost tooling like phishing kits and Phishing-as-a-Service, Malware-as-a-Service, separation of Initial Access Brokers from the operating ransomware affiliate or other form of bad actor, and so on. Script Kiddies, a class of unethical hacker, are prevalent and proliferate as ever, and really a full-spectrum scale of skills and knowledge in between. So I suppose to your point, band-aided technologies have only compounded this problem, but I believe it's more of a human problem than a technology one. Look at how many billions of dollars scammers are scamming people without even a need for hacking networks or devices... just hacking the human mind!
On that bombshell... an honorable mention to the late Kevin Mitnick! 🫡