In terms of redundancy, you would be covered by the switch stacking if one switch or link failed. You can test this after installation to make sure it works. I strongly advise against daisy chaining or otherwise connecting the switches together in any other method. Regarding stacking cables, you'll probably need (5) 50 cm and (1) 1m cable, dependent on switch placement.
https://documentation.meraki.com/General_Administration/Cross-Platform_Content/Small-Form_Factor_Plu...
I would also find out if the firewalls used support link aggregation (LACP) and if you want to use this as an opportunity to use that feature (this is a huge PITA with Cisco ASA). If you implement link aggregation within your maintenance window, Meraki best practice is to connect ports in a link aggregation bundle to equidistant switches in the stacking topology: e.g. connecting the firewalls to switch 3 & 6. This is to reduce the number of hops and overall traffic on stacking cables. Not necessary, but better practice. Although, I would also consider connecting the standby firewall to different switches, so active firewall would go to switch 3 & 6, and the backup firewall would go to switch 2 & 5.
WRT using Meraki switches to distribute an ISP circuit to HA firewalls, this works perfectly (in a separate VLAN). However, in practice, this results in confusing reporting in the Meraki dashboard as the uplink port will show as a client that has the highest bandwidth usage. So, I marked the port and the client (identified by the ISP router's MAC address) accordingly (and added detailed circuit notes). Unless this is fixed in the dashboard, I would prefer in the future to budget for a separate switch for this purpose, but this also seems excessive for a non-profit unless there was an extra switch available. If it were a Meraki switch, I'd set it up in a separate network. It would be great if one could exclude a client from being tracked on usage (or not show up in the clients list) based on its MAC address or connected port, w/ or w/o Dynamic ARP inspection being enabled (it happens to disabled for me in this case).
Putting that dashboard issue aside, I would consider using a different switch for the ISP uplink that isn't used to connect to the firewalls. This would help distribute the use of SFP+ ports on the MS250 switches. And it could make troubleshooting easier, especially if you're not on-site.
BTW, there is a free course on MS switch uplinks, but it doesn't cover connections to ISPs for HA firewalls.
https://learning.meraki.net/#/online-courses/9d5e7787-b409-4b9d-bd99-b2b75d1bca71