SQUAD BLOG

We love words. Long words. Short words. 50 cent words. We like to say words, record words, yell words, type words, text words, and sometimes sing words. Occasionally we have to eat our words. They tasted like chicken.

Here you will find words from MPWRPeople superheroes that will educate, uplift, and, hopefully, catalyze action.

Top 5 Graphic Design Tips for Marketers

Image of Matt McPartland
Matt McPartland

Using graphic design in marketing is fundamental; knowing the elements and mistakes of...

Read more

What is Ransomware?

Image of Paul Thrasher
Paul Thrasher

Ransomware is a type of malicious software, or malware, that prevents you from accessing your...

Read more

Infographics in Marketing

Image of Matt McPartland
Matt McPartland

What are infographics? Why are they important for a company’s marketing purposes? Infographics are ...

Read more

Phishing Scams and How to Avoid Them

Image of Stephen Roberts
Stephen Roberts

Phishing scams are rampant in today’s world and are of particular concern to those concerned about...

Read more

Design and the User Experience (UX)

Image of Matt McPartland
Matt McPartland

Designing with the user experience in mind is a must for every designer working in marketing. There...

Read more

Hacking and How to Prevent It

Image of Andrew Blais
Andrew Blais

Hacking refers to activities that seek to compromise digital devices, such as computers,...

Read more

Elements of Graphic Design in Marketing

Image of Matt McPartland
Matt McPartland

There are rules for good design that every designer learns in the beginning. After all, it’s easy...

Read more

The Importance of Graphic Design in Marketing

Image of Matt McPartland
Matt McPartland

When it comes to business and marketing efforts, graphic design should not be taken lightly....

Read more

Business Strategy

Image of EJ Phillips
EJ Phillips

A brilliant visionary and entrepreneur (and perhaps one of the greatest...

Read more

What is IT Security?

Image of EJ Phillips
EJ Phillips

IT security is a set of strategies designed to prevent unauthorized access to organizational...

Read more