Well, even if they were able to connect to your network by hacking the wi-fi, the computer which the "software" is installed on, has its own layer of security. They would need to login into the computer and then log into the "software" to access these sensitive documents.