SELECT foo, bar, etc FROM Bobby WHERE this = that
AND GB.ET_ID = @accountID ORDER BY mySort
Then, in the command variable, add parameters. Like this:
myCommand.Parameters.AddWithValue("@accountID", strAccountID);
You have to understand that the vulnerability lies in the fact that if strAccountID comes from a control which is editable by the user, it might contain something like:
' drop table GBS_BTN --
Which would cause your program to run part of the query, then delete the table.
Edit: and using parameters as in the example causes anything the user has typed to be escaped, so you're safe from this kind of exploit. As others have suggested, you could also use stored procedures. You'd then be forced to use parameters like in the example. Stored procedures have other characteristics that might be helpful for you, but that's another discussion.